Preferred Language
Articles
/
BBb-9YsBVTCNdQwC_uf_
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabrication of the S-box has a very large key space as it depends on the user's key. The encryption-decryption method allows changing pixel positions with the help of dynamically generated S-boxes, images, videos, etc. Thus, the study shows that a new method of S-boxes for dynamic cipher algorithms can be easily generated and applied to image encryption.

View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Content-Based Cartoon Image Retrieval
...Show More Authors

Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Orthogonal polynomial embedded image kernel
...Show More Authors

View Publication
Scopus (25)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Image Segmentation for Skin Detection
...Show More Authors

Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Oct 04 2023
Journal Name
Exergy - New Technologies And Applications
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel

... Show More
View Publication
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Visual image in Farzdaq hair
...Show More Authors

The research shows that the visual image plays an important role when Farzdaq in the issue of aesthetic perception, it enables him to feel a sense of artistic and mental perception to raise astonishment and admiration through his ability to link the optics through the suggestive image to carry us to a new vision imagined full of visual images.

View Publication Preview PDF
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Dynamic Analysis of Fluid – Structure Interaction of Axial Fan System
...Show More Authors

Fluid-structure interaction method is performed to predict the dynamic characteristics of axial fan system. A fluid-structure interface physical environment method (monolithic method) is used to couple the fluid flow solver with the structural solver. The integration of the three-dimensional Navier-Stokes equations is performed in the time Doman, simultaneously to the integration of the three dimensional structural model. The aerodynamic loads are transfer from the flow to structure and the coupling step is repeated within each time step, until the flow solution and the structural solution have converged to yield a coupled solution of the aeroelastic set of equations. Finite element method is applied to solve numerically

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Theoretical Investigation of Impact Dynamic Plasticity for CK45
...Show More Authors

Abstract

This paper represents a study of the effect of the soil type, the drilling parameters and the drilling tool properties on the dynamic vibrational behavior of the drilling rig and its assessment in the drilling system. So first, an experimental drilling rig was designed and constructed to embrace the numerical work.

The experimental work included implementation of the drill-string in different types of soil with different properties according to the difference in the grains size, at different rotational speeds (RPM), and different weights on bit (WOB) (Thrust force), in a way that allows establishing the charts that correlate the vibration acceleration, the rate of penetration (ROP), and the power

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 1997
Journal Name
Polymer-plastics Technology And Engineering
Feasibility of Dynamic Acid Corrosion Control in Oil Well Tubing
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref