Preferred Language
Articles
/
bsj-6398
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of  five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 15 2025
Journal Name
Journal Of Legal And Political Studies
International and Regional Competition in the Middle East and its Impact on Iraqi National Security, with Special Reference to the Kurdistan Region: A Study of Challenges and Opportunities
...Show More Authors

This competition between competing forces, organized into axes with conflicting objectives, is reflected in all regional affairs and the goals and interests of countries within them, including Iraq. Among the most important aspects impacted by the repercussions of international and regional competition in the region is Iraqi national security, based on its vital importance in preserving the sovereignty and entity of the Iraqi state, protecting the interests and cohesion of the state and people, ensuring and defending their present and future, and interacting with various regional and international activities. The Kurdistan Region, as an important part of Iraq with its own unique characteristics, may be one of the most important regi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Educational And Psychological Researches
An Instructional Design According to the constructivism Model for Chemistry Subject and Its Effect on the Life Skill by the Second Intermediate Female Students
...Show More Authors

The research aims to identify the effect of teaching-learning design based on the constructivism theory on the life skills of middle stage students. The sample consisted of (60) students from one of the middle schools in Baghdad's governorate. The experimental group and control group consisted of 30 students for each group, the research tool was the life skills scale composed of (78) items. The scale proved its validity and reliability, which was found to be (0.85). The results showed a statistically significant difference in life skills between the two groups of research in favor of the experimental group, which studied the educational design according to models of constructivism theory compared to the usual method of teaching.

View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
International Journal Of Computer Science And Mobile Computing
Adaptive Color Image Compression of Hybrid Coding and Inter Differentiation Based Techniques
...Show More Authors

Publication Date
Sat Mar 08 2025
Journal Name
Fusion: Practice And Applications
Fast Numeric Sign Detection Using Adaptive Thresholding and Geometry of Optimized Fingers
...Show More Authors

A strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as

... Show More
Scopus
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
Adaptive Response and its relation to Cognitive Appraisal among Secondary School Students
...Show More Authors

The current research's problem includes the impact of cognitive reappraisal and reformulate on self-experience of emotional response and its negative feelings and the activity of cognitive reappraisal in changing response. The aim of this research is to detect the relation between adaptive response and cognitive reappraisal upon students of secondary school, and to find differences in gender and stage. The sample contained male and female student for the year(2022-2023) and consists of (480) students (240) male and (240) female in the karkh education/ 1 To achieve this aims researcher used descriptive method and to measure the two variables researcher built a scale for adaptive response according to theory of compound emotion (Barrett,20

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 30 2014
Journal Name
مجلة العلوم الاقتصادية والادارية - جامعة بغداد
تحليل الأثر الارتدادي و التفاعلي بين السياسة المالية و النقدية على التوازن الاقتصادي العام (IS-LM)‎
...Show More Authors

يتناول هـذا البحث بالتحليل التفاعل و التنسيق بين السياستين الماليـة و النقديـة و اثر هذا التفاعل و التنسيق على الاستقـرار و النمـو الاقتصـادي، و كيف ان الآثار المالية للسياسة النقدية قد تحفز الإجراءات الخاصة بالسياسة النقدية و معالجة الآثـار الجانبيـة و طبيعـة التفاعل و الارتداد بين إجراءات كلتا السياستين و أثرهما في التـوازن الاقتصـادي العــام، و تم في ثنايا البحث توضيح مسوغات التنسيق و مدى ضرورة ذلك بهد

... Show More
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Local Food Crisis in Iraq Between Thoughts of the Malthusian Theory and the Agricultural Section Regression Reality
...Show More Authors

Most countries in the world particularly developing countries, including Iraq,  facing  extremely dangerous problem with social and political dimensions, which is the emergence of the food crisis  problem ,the decrease in domestic food production in Iraq isn't meet the needs of its population food, due to the fact that the agricultural sector suffers from multiple natural ,economic  and human   problems .It is still below the level required to meet the needs of the population  of  food ,since food  at the forefront of priorities needed by the human . This represents indispensable  basic  necessity , so the responsibility of its availability permanently  in appropriate&nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Quadratic Form Ratio Multiple Test to Estimate Linear Regression Model Parameters in Big Data with Application: Child Labor in Iraq
...Show More Authors

              The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances.  From the diversity of Big Data variables comes many challenges that  can be interesting to the  researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Preparation-and Spectroscopic Characterization of Transition Metal Complexes with Schiff base 2-[1-(1H-indol-3-yl)ethylimino) methyl]naphthalene-1-ol
...Show More Authors

The ligand 2-[1-(1H-indol-3-yl)ethylimino) methyl]naphthalene-1-ol, derived from 1-hydroxy-2-naphthaldehyde and 2-(1H-indol-3-yl)ethylamine, was used to produce a new sequence of metal ions complexes. Thus ligand reactions with NiCl2.6H2O, PdCl2, FeCl3.6H2O and H2PtCl6.6H2O were sequentially made to collect mono-nuclear Ni(II), Pd(II), Fe (III), and Pt(IV). (IR or FTIR), Ultraviolet Reflective (UV–visible), Mass Spectra analysis, Bohr-magnetic (B.M.), metal content, chloride content and molar conductivity have been the defining features of the composites. The Fe(III) and Pt(IV) complexes have octahedral geometries, while the Ni(II) complex has tetra

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref