Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering inside random text. In the third scenario the encryption process insures a correct restoration of original message. Experimental results show that the proposed cryptosystem works well and secure due to the huge number of fingerprints may be used by attacker to attempt message extraction where all fingerprints but one will give incorrect results and the message will not represent original plain-text, also this method ensures that any intended tamper or simple damage will be discovered due to failure in extracting proper message even if the correct fingerprint are used.
In this paper, we introduce the notions of Complete Pseudo Ideal, K-pseudo Ideal, Complete K-pseudo Ideal in pseudo Q-algebra. Also, we give some theorems and relationships among them are debated.
In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas
... Show MoreAniera desert/cola was found new to science and to the Iraqi fauna. The description was
mainly based on external features and male genit
In this research four steps of the new derivatives of Naproxen drug have been made which are known as a high medicinal effectiveness; the first step involved converting Naproxen into the corresponding ester (A) by reaction Naproxen with methanol absolute in presence H2SO4. While the second step involved treatment methyl Naproxen ester (A) with hydrazine hydrate 80% in presence of ethanol .The third reaction requires synthesis of Schiff bases (C1-C10) by condensation. of Naproxen hydrazide (B) with many substituted aromatic aldehydes . Finally, the fourth step synthesized new tetrazole derivatives ( D1- D10) by the reaction of the prepared Schiff bases (in the third step) with Sodium azide in THF as a solvent .The prepared compounds wer
... Show MoreThe compound [G1] was prepared from the reaction of thiosemicarbazide with para-hydroxyphenylmethyl ketone in ethanol as a solvent. Then by sequence reactions prepared [G2] and [G3] compounds. The compound [G4] reaction with ethyl acetoacetoneto synthesized compound [G6] and acetyl acetone to synthesized compound [G5]. Reaction the [G3] with two different types of aldehydes in the present of pipredine to form new alkenes compounds [G7]and [G8].The compound [G3] reacted with hydrazine hydrate to formation[G4] with present the hydrazine hydrade 80% in (10) ml of absolute ethanol. Latter the compound [G4]reacted with different aldehydes with present the glacial acetic acid and the solvent was ethanol to formed the Schiff bases compounds[G9] an
... Show MoreIn this study, two correlations are developed to calculate absolute rocks permeability from core samples tested by Gas Permeameter Apparatus. The first correlation can be applied if K g≤100, the second correlation can be applied if Kg>100. Sixty core samples having different permeabilities to give a wide range of values that necessary to achieve a correlation.
The developed correlation is easily applied and a quick method to avoid repeating the test at different pressure values. Only one pressure test is required to reach absolu
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
Abstract The present work included morphological, anatomical, and palynological characters for the new species Acaalypha australis L. specimens, which belong to the family Euphorbiaceae. The species recorded in the study for the first time in Iraq. The plants of this species are annual herbs with green, striated or sub – polygonal stem, and branched near bases, Leaves are simple spirally alternate and lanceolate in shape. Flowers are unisexual, arranged in the axial of distinct leafy and cordate bracts, female flower arranged at the bracts bases and each flower with trileafed perianth and superior ovary with trilobed stylar stigma which has dense and coiled stigmatic hairs. Male flowers are arranged as a mixed verticellate inflorescence a
... Show More