Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Environmental management system in accordance with the requirements of the international standard (ISO 14004) and its applicability "Case study at Al-Ma'mun plant (vegetable oil)"
...Show More Authors

 The search aims to clarify pollution to negative effects on environment and to an increasing in the dangerous polluted materials that discharged out these factories. To make active procedures in order to limit the environmental pollution.   

 The search problem came from an assumption which has the researched factory is suffering from the lack of applying the international specification      ( ISO 14004 ). The research problem assimilated by these questions:

  1. What is the level or organization in thinking of environmental system according to ISO 14004 .
  2. What are the requirements used in researched factor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 16 2020
Journal Name
Route Educational & Social Journal
Effect of applying the QR-Code system for acquisition chemistry and creative thinking in of first class female student at intermediate schools.
...Show More Authors

This research aims at identifying the system of applying the QRcode system for acquisition of chemistry by first class female students studying at intermediate schools knowledge and its effect on creative thinking. The research sample consisted of (63) female students in one of the intermediate schools in Baghdad/Iraq using two equivalents experimental and control groups. The scientific context used was based on the chemistry text book related to the periodic table, (Metals) for the first group of students and Alkaline metals,Nonmetals, Metalloides) for the second group. The research methodology employed consisted of the followings :Measuring students acquisition using (35) issues. The results were verified for their face validity and obtai

... Show More
Publication Date
Sun Jan 05 2014
Journal Name
Journal Of Educational And Psychological Researches
The educational violence and it's reflections on study attainment of the primary stage pupils
...Show More Authors

Chapter-1

Problem of the research: 

The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .

It is a training method for the person to participate in the society and prepare him to be an effective member.

The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.

The current research aims to:

1 – The kinds of violence which happens to the children in the primary

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
STUDY THE PHYSICAL AND CHEMICAL PROPERTIES AND DETERMINATION THE CYTOTOXICITY OF KOJIC ACID PRODUCED FROM THE LOCAL ISOLATE ASPERGILLUS FLAVUS WJF81 AND THEIR EFFECTS ON CONSUMER HEALTH.: STUDY THE PHYSICAL AND CHEMICAL PROPERTIES AND DETERMINATION THE CYTOTOXICITY OF KOJIC ACID PRODUCED FROM THE LOCAL ISOLATE ASPERGILLUS FLAVUS WJF81 AND THEIR EFFECTS ON CONSUMER HEALTH.
...Show More Authors

Steps were taken to obtain the Kojic acid crystals from local fungal isolation A. flavus WJF81 by separating the fermentation products from the fungus mycelium from the production plant at the centrifuge at a speed of 5000 cycles for 10 minutes. The extraction was followed by ethyl acetate then supernatant concentrate by using rotary evaporator, and dried with heat oven 37ºC. Long, yellowish, pristine acid crystals were obtained that examined the optical microscope with a magnification force of 10x and 40x. The melting point of kojic acid was determined between 152.9-153.5 °C Results of the diagnosis of Kojic acid by applying High pressure liquid chromatography HPLC technique showed that the acid was at one peak, which was close to the

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 30 2025
Journal Name
Al–bahith Al–a'alami
The Boundary between Advertisement and Mass Media Overlapping Levels in the Press (The Case of Iraq)
...Show More Authors

The advertisement is important in maximizing the resources of journalistic institutions. It helps them to perform their duties and also establishes their independence. However, this type of communication has often overlapped with other types of communication, including media and publicity.

Those in charge of the press bear responsibility in this regard, as some of them harness the advertisement for personal purposes; or detrimental to media content. Many communication authorities have drawn attention to the danger of confusing the concepts and levels of the three activities and have moved towards establishing rules to reduce overlap between them.

The aim of this research is to try to disengage the concept of advertising,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Thefts in hospitals and the factors affecting themA case study in the Department of Health Baghdad - Rusafa
...Show More Authors

Employee Stealing or internal theft is considered from the passive practices that can’t be denied or be hidden, In spite of the hospital privacy as a serving organization that works 24\7 and deleing with human lives, they weren’t infallible from that kind of practice. To prevent or reduce this practice, it was important to search for the organizational and behavioral factors influencing internal thefts. The study problem briefly is to reach the most organizational and behavioral factors influencing internal theft, in governmental hospitals in Baghdad Rusafa Health district, this was done by analyzing (20) administrative cases of thefts occurred in the District, also a sample of (60) specialist Doctor’s opinion work, in (3) hospital

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Postgraduate Medical Journal
Femal pattern alopecia and lipoproteins
...Show More Authors

KE Sharquie, AA Noaimi, HA Salman, NA Hindy, Iraqi Postgraduate Medical Journal, 2009 - Cited by 1

View Publication
Publication Date
Thu Oct 01 2009
Journal Name
Journal
Female pattern alopecia and lipoproteins
...Show More Authors

S Khalifa E, N Adil A, S Husam Ali, H Nibras A…, 2009

View Publication
Publication Date
Fri Jul 01 2011
Journal Name
Alustath
Pun in English and Arabic
...Show More Authors

Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Structure and Melodic Sabean Mandaean
...Show More Authors

The Mandaean religion of ancient and important religions in Iraq and Iran has its own rituals which are characterized by the use of singing and toning of speech. It began with the creation of human beings through a group of prophets. Peace be upon them. Researcher research problem, and explained the importance of research and objectives and limits and identify terminology. The second topic is the theoretical framework to include the history of the Sabean Mandaean, secondly their religious rites, sources, major books and secondary books for the Latin tribes of Mandaean. Finally, the researcher tackled the sources of their sacred books and previous studies. The third topic represented the procedures. The researcher dealt with the musical a

... Show More
View Publication Preview PDF
Crossref