Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Micro- And Nanoengineering Of The Cell Surface
Engineering the Surface of Cells Using Biotin–Avidin Chemistry
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jan 02 2010
Journal Name
Journal Of Al-nahrain University
HIDDEN FEATURES DETECTION USING HISTOGRAM MODIFICATION IN MRI IMAGES
...Show More Authors

Magnetic Resonance Imaging (MRI) uses magnetization and radio waves, rather than x-rays to make very detailed, cross- sectional pictures of the brain. In this work we are going to explain some procedures belongs contrast and brightness improvement which is very important in the improvement the image quality such as the manipulation with the image histogram. Its has been explained in this worked the histogram shrink i.e. reducing the size of the gray level gives a dim low contrast picture is produced, where, the histogram stretching of the gray level was distributed on a wide scale but there is no increase in the number of pixels in the bright region. The histogram equalization has also been discuss together with its effects of the improveme

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Wuhaib, K.m. , Hadi, B.h. , Hassan, W.a. Iraqi Journal Of Agricultural Sciences, 2016, 47(5), Pp. 1151–1165
Some genetic parameter in maize using full diallel crosses
...Show More Authors

Scopus (8)
Scopus
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 31 2016
Journal Name
International Journal Of Advanced Research
Attenuation Coefficient of Reactive Powder Concrete Using Different Energies.
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Anemia Blood Cell localization Using Modified K- Means Algorithm
...Show More Authors

View Publication
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Removal of Cadmium from Industrial Wastewater using Electrocoagulation Process
...Show More Authors

Cadmium is one of the heavy metal found in the wastewater of many industries. The electrocoagulation offers many advantages for the removal of cadmium over other methods. So the removal of cadmium from wastewater by using electrocoagulation was studied to investigate the effect of operating parameters on the removal efficiency. The studied parameters were the initial pH, initial concentration, and applied voltage. The study experiments were conducted in a batch reactor with  with two pairs of aluminum electrodes with dimension  and 2mm in thick with 1.5 cm space between them. The optimum removal was obtained at pH =7, initial concentration = 50 mg/L, and applied voltage = 20 V and it was 90%.

View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Strength Improvement of Clay Soil by Using Stone Powder
...Show More Authors

Soil stabilization with stone powder is a good solution for the construction of subgrade for road way and railway lines, especially under the platforms and mostly in transition zones between embankments and rigid structures, where the mechanical properties of supporting soils are very influential. Stone powder often has a unique composition which justifies the need for research to study the feasibility of using this stone powder type for ground improvement applications. This paper presents results from a comprehensive laboratory study carried out to investigate the feasibility of using stone powder for improvement of engineering properties of clays.

The stone powder contains bassanite (CaSO4. ½ H

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Reducing settlement of soft clay using different grouting materials
...Show More Authors
Abstract<p>Different injection material types were tried in the injection of soft clay, such as lime (L), silica fume (SF), and leycobond-h (LH). In this study, experiments were made to study the effect of injection on soft clay consolidation settlement. A sample of natural soft clayey soil was investigated in the laboratory and the sample was injected with each of the grout materials used, L, SF, L + SF, and L + SF + LH. A 20 cm<sup>3</sup> of each slurry grout was conducted into the soil, which was compacted in California Bearing Ratio (CBR) mold and cured for 7 days, and then the sample was loaded to 80 N load by a circular steel footing 60 mm in diameter. The settlement was r</p> ... Show More
View Publication
Scopus (8)
Crossref (9)
Scopus Clarivate Crossref