Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The women at Al-Sakhaawi Book "A;-Dhau Al-Lami", Study in the social life
...Show More Authors

In our previous research , we study the method of women by ( al – sakhaawi " died 902
ah/1496a.c"book witch called ( al- dhau, al-lami) .
So in this paper , we will discuss the social life of women in the mamluk period through the
same book ,especially when the sakhaawi devoted a full part for women in the same book
called it (mhagam ,al –nessa)wich it translations a large number of women like wives
,daughters ,sisters ,and maids of mamluk sultans ,so that make my able to know a lot about
the social life of woman which we study it like a social aspects of women, here wealth,
business, professions ,and in the last we study the habits of them marriage .

View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Arts Faculty Of Baghdad University
The Discourse of Christian Minority in Saad Hana's Novel "Abducted in Iraq": A Critical Perspective.
...Show More Authors

Publication Date
Mon Jul 01 2013
Journal Name
2013 35th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
A preliminary investigation of the effect of force variation for myoelectric control of hand prosthesis
...Show More Authors

View Publication
Scopus (37)
Crossref (25)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Clinical Dentistry
THE EFFECT OF A PROTECTIVE BARRIER ON THE SHEAR BOND STRENGTH OF DIFFERENT ORTHODONTIC BRACKETS
...Show More Authors

Background and objectives: This study aimed at testing the effect of plastic sleeve or barrier, used to cover the guide of the light cure unit to prevent cross-infection, on the shear bond strength and site of bond failure of stainless steel and ceramic orthodontic brackets. Materials and methods: Forty orthodontic brackets; twenty stainless steel and twenty ceramic brackets bonded to forty extracted human maxillary first premolars using light cure adhesive cured with and without the use of a protective plastic barrier on the guide. Comparing the effect of this barrier on the shear bond strength and adhesive remnant index was performed using an independent t-test and Chi-square test. Results: The protective barrier had decreased the shear b

... Show More
Scopus (3)
Scopus
Publication Date
Sat Aug 12 2023
Journal Name
Southern African Linguistics And Applied Language Studies
Linguistic Deviations in Joseph Conrad's 'Heart of Darkness': A Pragmatic Perspective
...Show More Authors

APDBN Rashid, Southern African Linguistics and Applied Language Studies, 2023

View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Internet And Distributed Computing Systems
A Proposed Adaptive Rate Algorithm to Administrate the Video Buffer Occupancy for Smooth Video Streaming
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed program to audit the performance of the hotel sector under crises (Applied Research)
...Show More Authors

Abstract:

        The research sought to identify the crises that occurred during the research period and their reflection on the performance of the hotel Research sample as well as to identify the reality of auditing the hotel Research sample and the preparation of a performance audit program can be adopted in auditing the performance of hotels in light of crises, and the problem of the research lies in the lack of a program to audit the performance of hotels that takes into account the crises experienced by the hotel sector, The research was based on solving its problems on three hypotheses, the first is that the performance audit in light of the Covid-19 pand

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 07 2003
Journal Name
University Of Baghdad
A STUDY ON SOLVENT EXTRACTION OF HOLMIUM (III) WITH SUDAN BLACK B REAGENT (M.Sc. Thesis)
...Show More Authors

Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Iklīl For Humanities Studies
The Decline of Language Loyalty in the Age of Audiovisual Nearness: A Socio-linguistic Approach
...Show More Authors

This article investigates the decline of language loyalty in the age of audiovisual nearness. It is a socio-linguistic review of previous literature related to language disloyalty. It reviews the current theoretical efforts on the impact of audiovisual nearness created by social media and language loyalty. The descriptive design is used. The argument behind this review is that the audiovisual nearness provided by social media negatively affects language loyalty. This article concludes that the current theoretical efforts have paid much attention to the relationship between the audiovisual nearness and language loyalty. Such efforts have highlighted the fact that the social media platforms have provided unprecedented nearness that provoke in

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Processes directing the scenography space in the Iraqi theatrical show Shakespeare texts as a model
...Show More Authors