Preferred Language
Articles
/
lhcqFY4BVTCNdQwCtjHQ
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Processing.

Scopus Crossref
View Publication
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (17)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
International Journal Of Computer Techniques
Multifractal-Based Features for Medical Images Classification
...Show More Authors

This paper presents a method to classify colored textural images of skin tissues. Since medical images havehighly heterogeneity, the development of reliable skin-cancer detection process is difficult, and a mono fractaldimension is not sufficient to classify images of this nature. A multifractal-based feature vectors are suggested hereas an alternative and more effective tool. At the same time multiple color channels are used to get more descriptivefeatures.Two multifractal based set of features are suggested here. The first set measures the local roughness property, whilethe second set measure the local contrast property.A combination of all the extracted features from the three colormodels gives a highest classification accuracy with 99.4

... Show More
Preview PDF
Publication Date
Mon Jan 31 2022
Journal Name
Flood Handbook
Debris and Solid Wastes in Flood Plain Management
...Show More Authors

Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Enhanced Multistage RSA Encryption Model
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 18 2019
Journal Name
Civil Engineering Journal
Circularization Technique for Strengthening of Plain Concrete Short Square Columns Subjected to a Uniaxial Compression Compressive Pressure
...Show More Authors

This paper presents an experimental study for strengthening existing columns against axial compressive loads. The objective of this work is to study the behavior of concrete square columns strengthening with circulation technique. In Iraq, there are significantly more reinforced rectangular and square columns than reinforced circular columns in reinforced concrete buildings. Moreover, early research studies indicated that strengthening of rectangular or square columns using wraps of CFRP (Carbon Fiber Reinforced Polymer) provided rather little enhancement to their load-carrying capacity. In this paper, shape modification technique was performed to modify the shape (cross section) of the columns from square columns into circular colu

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Nov 06 1010
Journal Name
Arabian Journal Of Geosciences
Mineralogy and Palyonlogy of the Mesopotamian plain sediments, Central Iraq
...Show More Authors