Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Environmental Earth Sciences
Urban geochemistry assessment using pollution indices: a case study of urban soil in Kirkuk, Iraq
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Cadmium Removal Using Bio-Electrochemical Reactor with Packed Bed Rotating Cylindrical Cathode: A Kinetics Study
...Show More Authors

   The kinetics of removing cadmium from aqueous solutions was studied using a bio-electrochemical reactor with a packed bed rotating cylindrical cathode. The effect of applied voltage, initial concentration of cadmium, cathode rotation speed, and pH on the reaction rate constant (k) was studied. The results showed that the cathodic deposition occurred under the control of mass transfer for all applied voltage values ​​used in this research. Accordingly, the relationship between logarithmic concentration gradient with time can be represented by a first-order kinetic rate equation. It was found that the rate constant (k) depends on the applied voltage, the initial cadmium concentration, the pH and the rotational speed of cathode. It

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
The Third International Conference On Mathematical Sciences
On Solvability of an Operator Equation
...Show More Authors

Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Thu Feb 01 2007
Journal Name
No
On Solvability of an Operator Equation-
...Show More Authors

Publication Date
Wed Aug 01 2007
Journal Name
University Of Baghdad, College Of Education For Pure Science (ibn Al-haitham), Department Of Mathematical
Thesis.On Solvability of an Operator Equation-
...Show More Authors

Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Debt swaps An Islamic Economic Evaluation
...Show More Authors

Introduction:

        Many business owners suffer major financial problems during periods of financial stagnation, the decline of markets and businesses, or under the impact of financial shocks for certain reasons that result in large debts and the consequent financial and legal obligations. This is the beginning of a long and endless path of suffering and the search for a safe exit. It is even worse for financial institutions to facilitate financial solutions that rely on lending as a solution to their financial problem. Debt and its consequences increase, and the problem deepens and becomes complicated until things become entangled and the escape or declaration of bank

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Aesthetics Environmental Art (An analytical study)
...Show More Authors

Find cares studying the aesthetics of environmental art, one of the topics that is one of the problems of the aesthetic side in the arts of postmodernism, so this research came as an attempt to get to know the aesthetic concepts of environmental art that can be learned from functional testing in the formation of the post-modern control. The research involved four chapters: The first chapter discusses the general framework of the research methodology, as it was displayed in itThe research problem and its importance and define its objective to identify the aesthetics of environmental art at the level of the body, meaning, the receiver .ozlk in Iraq and America as the spatial limits of the time limits are period stretching from 1970 to 2006

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Medical Sciences
Lower Gastrointestinal Bleeding: An Etiological Study.
...Show More Authors