Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Evaluate the effectiveness of internal control systems and their role in providing an effective governance framework in Sudanese banks
...Show More Authors

   The study aimed to find out the relationship between the dimensions of internal control systems and the availability of an effective governance framework in the Sudanese banks. The study used descriptive and analytical method for collecting and analyzing the study data using SPSS program. The questionnaire was used as an analysis tool. The target sample of Sudanese bank employees, the study found several results, including that the bank avoids methods that lead to the rational use of available resources, and identifies and separation of tasks among employees, in addition to rapid response to reports The study found several recommendations, including the need for a list of banks that are sufficiently flexible and comp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Journal Of Engineering
Innovation Diffusion Elaboration into Architectural Movement
...Show More Authors

The research investigates the term innovation and its role in elaborating architectural practice based on diffusion. The complexity of the architectural field compared with other fields shows a problem in explaining how innovations in architecture diffuse as a thought and act in a certain context of practice. Therefore, the research aims to build an intellectual model that explains the way personal thoughts resembled by unique models introduced by creative and innovator designers diffuse in a certain pattern elaborate these models into a state of prevailing thought resembled by the movement in architecture. The research will apply its model to the more comprehensive movement in architecture, which is the modern movement,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 21 2022
Journal Name
Energies
Dynamic Characteristics and Demonstration of an Integrated Linear Engine Generator with Alternative Electrical Machines
...Show More Authors

A linear engine generator with a compact double-acting free piston mechanism allows for full integration of the combustion engine and generator, which provides an alternative chemical-to-electrical energy converter with a higher volumetric power density for the electrification of automobiles, trains, and ships. This paper aims to analyse the performance of the integrated engine with alternative permanent magnet linear tubular electrical machine topologies using a coupled dynamic model in Siemens Simcenter software. Two types of alternative generator configurations are compared, namely long translator-short stator and short translator-long stator linear machines. The dynamic models of the linear engine and linear generator, validated

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Microstructural Characterization and Mechanical Properties of Similar and Dissimilar Al Alloys Joined using Friction Stir Welding
...Show More Authors

The influence of pre- shot peening and welding parameters on mechanical and metallurgical properties of dissimilar and similar aluminum alloys AA2024-T3 and AA6061-T6 joints using friction stir welding have been studied. In this work, numbers of plates were equipped from sheet alloys in dimensions (150*50*6) mm then some of them were exposed to shot peening process before friction stir welding using steel ball having diameter 1.25 mm for period of 15 minutes. FSW joints were manufactured from plates at three welding speeds (28, 40, 56 mm/min) and welding speed 40mm/min was chosen at a rotating speed of 1400 rpm for welding the dissimilar pre- shot plates. Tow joints were made at rotational speed of 1000 rpm and welding speed of 40m/min f

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 09 2014
Journal Name
Iosr Journal Of Mathematics (iosr-jm)
An Efficient Shrinkage Estimator for the Parameters of Simple Linear Regression Model
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Efficient Algorithm for Fuzzy Linear Fractional Programming Problems via Ranking Function
...Show More Authors

In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 10 2016
Journal Name
Iraqi Journal Of Science
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (48)
Crossref (39)
Scopus Clarivate Crossref