Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Estimation of Parameters for the Gumbel Type-I Distribution under Type-II Censoring Scheme
...Show More Authors

This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
Determination of Timewise-Source Coefficient in Time-Fractional Reaction-Diffusion Equation from First Order Heat Moment
...Show More Authors

     This article aims to determine the time-dependent heat coefficient together with the temperature solution for a type of semi-linear time-fractional inverse source problem by applying a method based on the finite difference scheme and Tikhonov regularization. An unconditionally stable implicit finite difference scheme is used as a direct (forward) solver. While by the MATLAB routine lsqnonlin from the optimization toolbox, the inverse problem is reformulated as nonlinear least square minimization and solved efficiently. Since the problem is generally incorrect or ill-posed that means any error inclusion in the input data will produce a large error in the output data. Therefore, the Tikhonov regularization technique is applie

... Show More
Preview PDF
Scopus Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
CFIA-Turbidimetric and Photometric Determination of Vitamin B9 (Folic acid) Using LEDs as a Source of Irradiation and Two Solar Cells as an Energy Transducer
...Show More Authors

A specific, sensitive and simple method was used for the determination of: vitamin B9 (Folic acid) in pure and pharmaceutical formulations using continuous flow injection analysis. The method is based on formation of ion pair compound between folic acid and ammonium molybdate in an aqueous medium to obtain a gray precipitate complex, using homemade; Ayah-6SX1-ST-2D solar cell CFI Analyzer. Optimum parameters was studied to increase the sensitivity for developed method. The linear range for the calibration graph was 0.01-0.6 mMol.L-1 of vitamin B9 and LOD was 131.994 ng/sample with correlation coefficient ( r ) of 0.9810, RSD% was lower than 0.1%, (n=9) for the determination of vitamin B9 at concentration (0.07and 0.5) mMol.L-1 respectiv

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
REVIEW THE ASSESSMENT OF EFFECTS OF LOST TIME INJURIES IN AN INDUSTRIAL SYSTEM BY USING AN EXPLANATORY PROGRAM
...Show More Authors

Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 21 2022
Journal Name
Journal Of Planner And Development
Enviromental impact assessment of cement industry using Leopold Matrix
...Show More Authors

The assessment of the environmental impact of the cement industry using the Leopold Matrix is ​​to determine the negative and positive impacts on the environment resulting from this industry, and what are the long-term and short-term effects, direct and indirect, and the amount of these effects and potential risks, and that this evaluation process is done through a number of methods, including Matrix method, including (Leopold).

 

The importance of the research because the cement occupies is of great importance in the world, especially in our country, Iraq, in the sector of construction and modernity, and the toxic emissions and solid waste produced by the production of this material. <

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 15 2018
Journal Name
Al-khwarizmi Engineering Journal
Bioremediation of Soil Contaminated with Diesel using Biopile system
...Show More Authors

This study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. The capability of mixed bacterial culture was examined to remediate the diesel-contaminated soil in bio piling system. For fast ex-situ treatment of diesel-contaminated soils, the bio pile system was selected. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). The amended soil:

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Improvement of the surface hardness and wear resistant of low carbon steel using laser radiation
...Show More Authors

0

View Publication Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Publicizing the survey image in local consumer protection the mission program is a model
...Show More Authors

The investigative film is part of the documentary films and is considered one of the important films that have a high viewership by the recipient, which is of great importance in transmitting information and contributing to creating awareness of the community through the advertising function performed by the cinematic image, as the researcher addresses the concept of advertising and its development through the time stages. And advertising functions. Then the researcher dealt in his research with the cinematic technical elements that contribute to the success of the investigative advertising work, such as camera movements, music, sound effects, dialogue ... etc., which enrich the investigative picture with realism and the flow of informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Calculating Surface Roughness for a Large Scale SEM Images by Mean of Image Processing
...Show More Authors

View Publication
Scopus (25)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
Spiritual Communication in Sufi Discourse- A communicative –Semiotic Approach to the Sufi Symbolic Image
...Show More Authors

This paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The n

... Show More
View Publication