Preferred Language
Articles
/
GRavmYcBVTCNdQwCcVgf
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process.

Crossref
View Publication
Publication Date
Thu Mar 05 2026
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (23)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 20 2020
Journal Name
Remote Sensing
Lossy and Lossless Video Frame Compression: A Novel Approach for High-Temporal Video Data Analytics
...Show More Authors

The smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 03 2022
Journal Name
Egyptian Journal Of Chemistry
A Novel Bio-electrochemical Cell with Rotating Cylinder Cathode for Cadmium Removal from Simulated Wastewater
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref