Preferred Language
Articles
/
nBboCocBVTCNdQwCYDKb
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering inside random text. In the third scenario the encryption process insures a correct restoration of original message. Experimental results show that the proposed cryptosystem works well and secure due to the huge number of fingerprints may be used by attacker to attempt message extraction where all fingerprints but one will give incorrect results and the message will not represent original plain-text, also this method ensures that any intended tamper or simple damage will be discovered due to failure in extracting proper message even if the correct fingerprint are used.

Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
The footnote of The Scholar Abdul Rahman Al-Penjawni on collecting mosques and explaining it to the local by the scholar Abdul Rahman Ibn Mulla Mohammed Ibn Mulla Tahir Al-Penjweni Died in: 1319 AH School: (Absolute and restricted) Study and Observation
...Show More Authors

 

Abstract

Indeed, being busy with the understanding of religion is the best sort of worship that the almighty God has given each period of time a number of scholars and wise men. They receive what has been passed down to them from their great ancestors, and those who are willing to learn will learn, their students preserve their knowledge through teaching and writing. Thus, the scholars were pioneers in this field due to the value and importance of their knowledge. They have strived in learning, explaining, and writing new subjects.

One of those scholars is sheikh (Abdulrahman Al-Penjweni) who passed away 1319 AH in one of the villages of the city of Sulaimani in Iraq. He was one of the wisest scholars, a br

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 20 2021
Journal Name
Materials Science Forum
Red Laser Irradiation Effect on the Structural Properties of MawsoniteCu<sub>6</sub>Fe<sub>2</sub>SnS<sub>8</sub> [CFTS] Thin Films Deposited via Semi-Computerized Spray Pyrolysis Technique
...Show More Authors

The existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
مجلة الآداب واللغات والعلوم الإنسانية
أسطرة الواقع في رواية ( صهيل النهر) للروائية السودانية بثينة خضر مكي
...Show More Authors

Abstract The myth is a story that is passed on to the generations generation after generation, ridiculed by literary writers in their literary work; to convey an important idea to the recipient, and in legend many things useful to the creator, especially the novelist, from that ritual and harnesses to be symbols that reach the recipient what the creator thinks; The Arabic novel, I chose Sahel al-Nahr's novel of Sudanese novelist Buthaina Khader Makki, a well-known author in her country for her advocacy of women and their rights. She used legend and mythic symbols in a deliberate manner to convince the recipient that what he read was a real thing worth standing at Understand E, has reached a number of results, including Butha

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Physics: Conference Series
Manufacturing and studying the effect of partial substitution on the properties of the compound Bi<sub>2-x</sub> Ag<sub>x</sub>Sr<sub>1.9</sub>Ba<sub>0.1</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> superconductors.
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A proposed encryption technique of different texts using circular link lists
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Dec 24 2024
Journal Name
Al–bahith Al–a'alami
Foreign Series in the Kurdish Satellite Channels and Their Role in the Development of Awareness among Young People in the Kurdistan Region (Korean Series as a Model) (A Field Study on a Sample of Students of the Institute of Fine Arts in the City of Sulay
...Show More Authors

The dubbing process for the Foreign Dramas by the Kurdish language became a serious phenomenon in the Kurdish satellite TV, especially in the past few years. It attracted a wide audience, especially young adolescents. And prepared by some breakthrough hostile to Kurdish culture and value coordinated by others remedy for the structural gaps and lapses have, as a result of climate which is brought into existence globalization and secretions variety dimensional, saturated value and cognitive effects bearing a strong identity of its elements. From here, the problem of this research is the ambiguity of their role in a series of developmental processes Kurdish awareness of young people and the extent of the impact that caused it.

This

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 01 2021
Journal Name
Nonlienear Optics Quantum Optics
Narrow Emission Linewidth of Highly-Pure Silicon Nitride Nanoparticles in Different Dye Solutions as Random Gain Media
...Show More Authors

In this work, two different laser dye solutions were used to host highly-pure silicon nitride nanoparticles as scattering centers to fabricate random gain media. The laser dye was dissolved in three different solvents (ethanol, methanol and acetone) and the final results were obtained for methanol only. The silicon nitride nanoparticles were synthesized by dc reactive magnetron sputtering technique with average particle size of 35 nm. The random gain medium was made as a solid rod with high spectral efficiency and low production cost. Optical emission with narrow linewidth was detected at 532-534 nm as 9 mg of silicon nitride nanoparticles were added to the 10 -5 M dye solution. The FWHM of 0.3 and 3.52 nm was determined for Rhodamine B and

... Show More
View Publication