Preferred Language
Articles
/
ijs-8276
Fast 128-bit Multi-Pass Stream Ciphering Method
...Show More Authors

      Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency and secrecy for this algorithm, which are the main criteria for these modifications. In this paper, the main modification made for the Blowfish algorithm is altering the S-box according to the principles of the block cipher (OFB). The results were approved using hamming distance and avalanche effect. The proposed algorithm presents advantages on several points, including reducing the required time for the encryption and decryption processes and preventing transmission errors from perpetuating all data. Also, we can conclude that the modified Blowfish algorithm can be used for all text encryption systems because of its flexibility (unlimited input text size and expanding key size).

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Experimental Study on Double-Pass Solar Air Heater with and without using Phase Change Material
...Show More Authors

In this paper, an experimental study was conducted to enhance the thermal performance of a double-pass solar air heater (SAH) using phase change material (PCM) for thermal storage at climatic conditions of Baghdad city - Iraq. The double-pass solar air heater integrated with thermal storage system was manufactured and tested to ensure that the air heating reserved after the absence of the sun. The rectangular cavity filled with paraffin wax was used as a latent heat storage and incorporated into the lower channel of solar air heater. Experiments were carried out to evaluate the charging and discharging characteristics of two similar designed solar air collectors with and without using phase change material at a constant

... Show More
View Publication Preview PDF
Crossref (20)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Civil Engineering Journal
Effect of Vehicular Stream Characteristics on Traffic Noise
...Show More Authors

Human health can be negatively impacted by exposure to loud noise, which can harm the auditory system. Traffic noise is the leading cause of noise pollution. This paper studies the problem of noise pollution on the roads in Baghdad, Iraq. Due to the increase in vehicle numbers and road network modifications in Baghdad, noise levels became a serious topic to be studied. The aim of the paper was thus to study traffic noise levels and the effect of the traffic stream on noise levels and to formulate a prediction model that identified the guidelines used for designing or developing future roads in the city. Then, the noise levels were measured based on five variables: the functional classification of roads, traffic flow, vehicle speed,

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Journal Of Physics
Gray-Scale Image Brightness/Contrast Enhancement with Multi-Model Histogram linear Contrast Stretching (MMHLCS) method
...Show More Authors

Gray-Scale Image Brightness/Contrast Enhancement with Multi-Model
Histogram linear Contrast Stretching (MMHLCS) method

View Publication Preview PDF
Publication Date
Tue Oct 13 2020
Journal Name
2020 Ieee International Conference On Mechatronics And Automation (icma)
A Robust Multi-Channel EEG Signals Preprocessing Method for Enhanced Upper Extremity Motor Imagery Decoding
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)
...Show More Authors

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
Bit Plane Slicing, Wavelet and Polynomials Mixing for Image Compression
...Show More Authors

     This paper introduced a hybrid technique for lossless image compression of natural and medical images; it is based on integrating the bit plane slicing and Wavelet transform along with a mixed polynomial of linear and non linear base. The experiments showed high compression performance with fully grunted reconstruction.

View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon Dec 18 2023
Journal Name
Journal Of Iraqi Al-khwarizmi
Fibrewise Multi-Compact and Locally Multi- Compact Spaces
...Show More Authors

The primary objective of this paper is to introduce a new concept of fibrewise topological spaces on D is named fibrewise multi- topological spaces on D. Also, we entroduce the concepts of multi-proper, fibrewise multi-compact, fibrewise locally multi-compact spaces, Moreover, we study relationships between fibrewise multi-compact (resp., locally multi-compac) space and some fibrewise multi-separation axioms.

Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
...Show More Authors

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem
...Show More Authors

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.