Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 03 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
A Study of Some Biochemical Variables and Functional Indicators and Their Relationship to the Achievement of 200m Young Runners
...Show More Authors

ES Hussein

View Publication
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Modeling and Simulation of Copper Removal from the Contaminated Soil by a Combination of Adsorption and Electro-kinetic Remediation
...Show More Authors

Electro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Oct 16 2023
Journal Name
F1000research
Assessment of general population knowledge, attitude, and practice on safe unused and expired drugs disposal: a cross-sectional study
...Show More Authors

Background The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa

... Show More
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Meta Gene
Association analysis of FTO gene polymorphisms rs9939609 and obesity risk among the adults: A systematic review and meta-analysis
...Show More Authors

View Publication
Scopus (11)
Scopus
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
information and communication technologies and their impact on changed the financial reporting system In a Sample in Iraqi banks
...Show More Authors

paid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte

... Show More
Scopus (66)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Thu May 11 2023
Journal Name
Engineering Applications Of Computational Fluid Mechanics
Photovoltaic-thermal system combined with wavy tubes, twisted tape inserts and a novel coolant fluid: energy and exergy analysis
...Show More Authors

To create a highly efficient photovoltaic-thermal (PV-T) system and maximise the energy and exergy efficiency, this study aims to propose an innovative configuration of a PV-T system comprising wavy tubes with twisted-tape inserts. Following the validation of a numerical model, a parametric study has been conducted to assess the geometrical effects of twisted tape and wavy tubes, as well as the coolant fluid type and velocity, on the overall performance of a PV-T system, located in Shiraz, Iran. It is found that employing twisted tape improves the energy and exergy efficiency by approx. 6.3%. The best configuration yields 12.4% and 16.8% increase in energy and exergy efficiency compared to conventional PV systems. This is achieved at 15% vo

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

View Publication
Scopus (66)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Scopus (66)
Crossref (47)
Scopus Clarivate Crossref