Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation. The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreEpoxy resins were modified by some thermosetting materials using unsaturated polyesters which were cured with styrene , MMA ,and MA . When unsaturated Polyester ( as thermosetting material ) was used , and cured with styrene showed better results than acrylic monomers . Thermal stability rised on modification of epoxy resins with unsaturated polyester . The new formulation had converted the epoxy resin from hard brittle material to hard and tough material .
Thermal analysis were studied using ( DSC ) and physicomechanical characteristics were measured .
The features of the actor's performance in the ritual theater are of great importance and chief in theatrical work since the first emergence of the theater, as the features of the performance were embodied in all Iraqi theatrical performances, but they took personal privacy in some ritual performances because of their differences and similarities between the ritual theatrical performance and the ritual show Al-Khalis, who wanted the researcher to know the similarities and differences in the features of the ritual performance and in the theatrical performance, despite the many transformations that occurred in the theater and affected the features of the performance, but it remained an important and attractive link between the recipient, t
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MorePurpose: the purpose of study is estimate the Risk premium, Interest rate, Inflation and FDI in the through of Coronavirus in the MENA countries. Theoretical framework: The theoretical framework included the study of the main variables, which are risk premium, interest rate, inflation, and foreign direct investment during the Corona virus pandemic. Design/methodology/approach: Concentrating on “COVID-19”, as an effective factor on the Foreign direct investment (FDI), I employ data of “MENA (Middle East and Northern Africa)” countries from 2000 to 2021 to investigate the impact of COVID-19, financial and macroeconomic indicators on FDI relying on the analytic research approach of Static panel data regression, includ
... Show MoreAbstract:
The prose poem of the 1990s is considered one of the important
contributions of the Iraqi poetic scene. The poem found a position in the Iraqi
poetry because of the favor of a group of youth poets who lefty clear traces.
Their linguistic techniques often violate the domain o9f language, significance
and image.
The poems of those youth poets moved the verse towards reality to
drink from its abundant springs in order to stand on a rigid ground. Their
linguistic traces are characterized by paradox and astonishment that are used
by the poet to construct his poem.
The paradox was considered an ideal means for constructing a
poem by some of them. The poem moved towards definitions and these
de
This research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show More