Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 20 2019
Journal Name
Iet Circuits, Devices & Systems
Multi‐bit error control coding with limited correction for high‐performance and energy‐efficient network on chip
...Show More Authors

In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Aug 28 2016
Journal Name
World Journal Of Pharmacy And Pharmaceutical Sciences
AN INSIGHT ON THE IDENTIFICATION OF CANCER STEM CELLS USING NOVEL IMMUNOLOGICAL AND MOLECULAR STRATEGIES
...Show More Authors

Cancer stem cells (CSCs) are defined as a population of cells present in tumours, which can undergo self-renewal and differentiation. Identification and isolation of these CSCs using putative surface markers have been a priority of research in cancer. With this background we selected pancreatic normal and tumor cells for this study and passaged them into animal tissue culture medium. Further staining was done using alkaline phosphatase and heamatoxilin staining. Blue to purple colored zones in undifferentiated pluripotent stem cells and clear coloration in the chromatin material indicated pancreatic cells. Further studies on the cell surface marker CD 44 were done using ELISA. For this, the protein was extracted from cultivated normal and t

... Show More
View Publication Preview PDF
Publication Date
Thu May 16 2019
Journal Name
Al-khwarizmi Engineering Journal
Study of Transverse and Longitudinal Crack Propagation in Human Bone Using the Finite Element Method with MATLAB
...Show More Authors

A finite element is a study that is capable of predicting crack initiation and simulating crack propagation of human bone. The material model is implemented in MATLAB finite element package, which allows extension to any geometry and any load configuration. The fracture mechanics parameters for transverse and longitudinal crack propagation in human bone are analyzed. A fracture toughness as well as stress and strain contour are generated and thoroughly evaluated. Discussion is given on how this knowledge needs to be extended to allow prediction of whole bone fracture from external loading to aid the design of protective systems.

View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Al-khwarizmi Engineering Journal
355nm Wavelength Generation of Nd:YAG Laser Using Olive Oil
...Show More Authors

 This project introduces a prospective material for photonic laser applications. The material is olive oil which is classified as organic compound, having a good nonlinear optical properties candidate to be used in photonic applications. A high purity sample of olive oil has been used. The theoretical calculation to generate third harmonic wave using olive oil has been determine using MATLAB program. THG (λ=355nm) intensity has been determined at two cases of sample thicknesses 1mm and 10mm. The minimum threshold incident intensity to obtain THG intensity are equal Iω=7530 mW/cm2 at L=1mm and Iω= 6220 mW/cm2 at L=10mm. The possibility of generation of third harmonic in olive oil inside

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Low Cost Heart Rate Monitor Using Led-Led Sensor
...Show More Authors

A high sensitivity, low power and low cost sensor has been developed for photoplethysmography (PPG) measurement. The PPG principle was applied to follow the dilatation and contraction of skin blood vessels during the cardiac cycle. A standard light emitting diodes (LEDs) has been used as a light emitter and detector, and in order to reduce the space, cost and power, the classical analogue-to-digital converters (ADCs) replaced by the pulse-based signal conversion techniques. A general purpose microcontroller has been used for the implementation of measurement protocol. The proposed approach leads to better spectral sensitivity, increased resolution, reduction in cost, dimensions and power consumption. The basic sensing configuration prese

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 27 2020
Journal Name
Journal Of The College Of Education For Women
Using the Image in Teaching Arabic Language Vocabulary to Non-Native Speakers: The Experience of the Arabic Language Institute - King Abdul-Aziz University - as a Model: آمال موسى عباس الإمام
...Show More Authors

The study aims to demonstrate the importance of instructional methods in teaching Arabic language as a second language or teaching the Arabic language to non-native speakers. The study is in line with the tremendous development in the field of knowledge, especially in the field of technology and communication, and the emergence of many electronic media in education in general and language teaching in particular. It employs an image in teaching vocabulary and presenting the experience of the Arabic Language Institute for Non-Speakers-King Abdul-Aziz University. The study follows the descriptive approach to solve the problem represented by the lack of interest in the educational methods when teaching Arabic as a second language. Accordingl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 20 2018
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Optimization of Digital Histopathology Image Quality
...Show More Authors

One of the biomedical image problems is the appearance of the bubbles in the slide that could occur when air passes through the slide during the preparation process. These bubbles may complicate the process of analysing the histopathological images. The objective of this study is to remove the bubble noise from the histopathology images, and then predict the tissues that underlie it using the fuzzy controller in cases of remote pathological diagnosis. Fuzzy logic uses the linguistic definition to recognize the relationship between the input and the activity, rather than using difficult numerical equation. Mainly there are five parts, starting with accepting the image, passing through removing the bubbles, and ending with predict the tissues

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Diyala Journal For Pure Science
Correlated Hierarchical Autoregressive Models Image Compression
...Show More Authors

View Publication
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More