Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 15 2025
Journal Name
Iraqi Journal Of Laser
Performance Enhancement of Metasurface Grating Polarizer Using Deep Learning for Quantum Key Distribution Systems
...Show More Authors

Metasurface polarizers are essential optical components in modern integrated optics and play a vital role in many optical applications including Quantum Key Distribution systems in quantum cryptography. However, inverse design of metasurface polarizers with high efficiency depends on the proper prediction of structural dimensions based on required optical response. Deep learning neural networks can efficiently help in the inverse design process, minimizing both time and simulation resources requirements, while better results can be achieved compared to traditional optimization methods. Hereby, utilizing the COMSOL Multiphysics Surrogate model and deep neural networks to design a metasurface grating structure with high extinction rat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using Mehar method to change fuzzy cost of fuzzy linear model with practical application
...Show More Authors

  Many production companies suffers from big losses because of  high production cost and low profits for several reasons, including raw materials high prices and no taxes impose on imported goods also consumer protection law deactivation and national product and customs law, so most of consumers buy imported goods because it is characterized by modern specifications and low prices.

  The production company also suffers from uncertainty in the cost, volume of production, sales, and availability of raw materials and workers number because they vary according to the seasons of the year.

  I had adopted in this research fuzzy linear program model with fuzzy figures

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Hydrogen Energy
Improvement of photofermentative biohydrogen production using pre-treated brewery wastewater with banana peels waste
...Show More Authors

View Publication
Scopus (65)
Crossref (64)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Study of vegetation cover distribution using DVI, PVI, WDVI indices with 2D-space plot
...Show More Authors

View Publication
Scopus (38)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Environmental Technology & Innovation
Environmental remediation of synthetic leachate produced from sanitary landfills using low-cost composite sorbent
...Show More Authors

Scopus (37)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Tue Jul 30 2019
Journal Name
Sn Applied Sciences
Removal of oil emulsion from aqueous solution by using Ricinus communis leaves as adsorbent
...Show More Authors

View Publication
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed May 03 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Enhancing smart home energy efficiency through accurate load prediction using deep convolutional neural networks
...Show More Authors

The method of predicting the electricity load of a home using deep learning techniques is called intelligent home load prediction based on deep convolutional neural networks. This method uses convolutional neural networks to analyze data from various sources such as weather, time of day, and other factors to accurately predict the electricity load of a home. The purpose of this method is to help optimize energy usage and reduce energy costs. The article proposes a deep learning-based approach for nonpermanent residential electrical ener-gy load forecasting that employs temporal convolutional networks (TCN) to model historic load collection with timeseries traits and to study notably dynamic patterns of variants amongst attribute par

... Show More
View Publication
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical expression of endocan, as a marker of assessment of angiogenic potential in benign vascular lesions (hemangioma, lymphangioma and lobular capillary hemangioma) of head and neck region
...Show More Authors

 BACKGROUND: Vascular tumors are a heterogeneous group of diseases with biological behavior ranging from a hamartomatous growth to frank malignant. The pathophysiology of lymphangioma, vascular malformation and hemangioma is interconnected, blood vessels known to be the site of origin of hamartomas, venous malformations and some neoplasms as benign, tumor-like growth of vessels (hemangiomas). Angiogenesis is the process of formation of new blood vessels from an existing structure.

Aims of study Assessment of angiogenic potential in benign vascular lesions (hemangioma, lymphangioma and lobular capillary hemangioma) of head and neck region.

 Materials and Methods: Twenty-two formalin-fixed paraffin-embedd

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Medico Legal Update
A Comparative Study about Knowledge, Attitude, Practice of Antibiotic Use and Perceptions of the Possible Causes of Resistance between Final Year Undergraduate Students and Postgraduate Pharmacy Students
...Show More Authors

Background: Antibiotic resistance is a problem leading to difficulty in treating microbial infections thatmay occur due to many causes. For the important pharmacist role as a reference for the information and theability to access to medications, they are vital members in lowering the development of antibiotic resistance,and also they support the proper use and control of antibioticsmisuse. Our goal is comparing the knowledge,attitude, practice of undergraduate and postgraduate pharmacy students and their perceptions about thecausing factors of antibiotic resistance in Iraq.Method: A cross sectional study was conducted involving the final year bachelor and postgraduate (masterand Philosophical doctor) students from different private

... Show More
View Publication
Crossref