Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Measuring university teachers attitudes towards the security man

Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Community organization and its impact On social security

The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 25 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
Design and Fabrication of an Electromechanical Tester to Perform Two-dimensional Tensile Testing for Flexible Materials

There are many diseases that affect the arteries, especially those related to their elasticity and stiffness, and they can be guessed by estimating and calculating the modulus of elasticity. Hence, the accurate calculation of the elastic modulus leads to an accurate assessment of these diseases, especially in their early stages, which can contribute to the treatment of these diseases early. Most of the calculations used the one-dimensional (1D) modulus of elasticity. From a mechanical point of view, the stresses to which the artery is subjected are not one-dimensional, but three-dimensional. Therefore, estimating at least a two-dimensional (2D) modulus of elasticity will necessarily be more accurate. To the knowledge of researchers, there i

... Show More
Preview PDF
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
Post-interactive communication A study to build a model for the flow of communication in social networking sites

The issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.

The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Boundary & Geometric Region Features Image Segmentation for Quadtree Partitioning Scheme

In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.

Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Cuneiform Tablets Image Preprocessing Proposed Algorithms Techniques for Pattern Recognition

Cuneiform symbols recognition represents a complicated task in pattern recognition  and image analysis as a result of problems that related to cuneiform symbols like distortion and unwanted objects that associated with applying Binrizetion process like spots and writing lines. This paper aims to present new proposed algorithms to solve these problems for reaching uniform results about cuneiform symbols recognition that related to (select appropriate Binerized method, erased writing lines and spots) based on statistical Skewness measure, image morphology and distance transform concepts. The experiment results show that our proposed algorithms have excellent result and can be adopted

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
Fourier Transform Coding-based Techniques for Lossless Iris Image Compression

     Today, the use of iris recognition is expanding globally as the most accurate and reliable biometric feature in terms of uniqueness and robustness. The motivation for the reduction or compression of the large databases of iris images becomes an urgent requirement. In general, image compression is the process to remove the insignificant or redundant information from the image details, that implicitly makes efficient use of redundancy embedded within the image itself. In addition, it may exploit human vision or perception limitations to reduce the imperceptible information.
     This paper deals with reducing the size of image, namely reducing the number of bits required in representing the

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Minimum Spanning Tree Algorithm for Skin Cancer Image Object Detection

This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
OFDM PAPR reduction for image transmission using improved tone reservation

High peak to average power ration (PAPR) in orthogonal frequency division multiplexing (OFDM) is an important problem, which increase the cost and complexity of high power amplifiers. One of the techniques used to reduce the PAPR in OFDM system is the tone reservation method (TR). In our work we propose a modified tone reservation method to decrease the PAPR with low complexity compared with the conventional TR method by process the high and low amplitudes at the same time. An image of size 128×128 is used as a source of data that transmitted using OFDM system. The proposed method decrease the PAPR by 2dB compared with conventional method with keeping the performance unchanged. The performance of the proposed method is tested with

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
Bit Plane Slicing, Wavelet and Polynomials Mixing for Image Compression

     This paper introduced a hybrid technique for lossless image compression of natural and medical images; it is based on integrating the bit plane slicing and Wavelet transform along with a mixed polynomial of linear and non linear base. The experiments showed high compression performance with fully grunted reconstruction.

View Publication Preview PDF
Scopus (4)
Scopus Crossref