Preferred Language
Articles
/
bsj-6398
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of  five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The biography of the Prophet Muhammad () and his Sunnah between softness and distress
...Show More Authors

The Prophet Muhammed () is distinguished in the history of mankind by the fact that he came with a law that combined these two opposing sides, reality and ideals, a wonderful and amazing collection, and he created a wonderful composition between them, and they used together a wise comprehension to ensure the treatment of its ills, and the reform of their delusions together, and uses both Both of them are in the necessary position of the needs of life, and the contradictions and separation of this collection and the wise harness in this research from his law, may God bless him and grant him peace, which shows us this balance in the system of Islam, the most sincere representation, where it is one of the honors of morality, good appreci

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The concept of inconsistency and measuring the inverse relationship between overlap and contrast.
...Show More Authors

 

abstract:

The aim of this study is to clarify the relationship between the concept of  inconsistency and the measurement of the inverse relationship of overlap and contrast. The study will address the following points:

  1. Explaining the true nature of inconsistency and contrast, as understanding their relationship is essential for determining them.
  2. Examining the view of the scholars regarding their significance as approaches to understanding the relationship.
  • Identifying the relationship between inconsistency and contrast in terms of overlap and contrast.

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
Sufi Tendency Between Abdul Wahab Al-Bayati and Sohrab Sepehri
...Show More Authors

Comparative studies are, in a sense, a study of cultural identity in a broader and deeper way, as self-knowledge is in part an awareness of the other. Therefore, every study that falls within the scope of comparative literature is a study of the authentic human identity that is open to the other without distorting the individual self or cancellation of social, environmental or national affiliation.

 

      Modern comparative studies seek to go beyond the unilateral perspective of knowledge, which often leads its holders to condescend to all that may be the characteristics of the other. They strengthen the human ties between societies that differ in their culture, literature, and language, esp

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
The Moral Value in Iraqi Society between Change and Constant
...Show More Authors

The problem of constant and change values is one of the important problems that the philosophy thought had faced as the religious and social studies had taken it as it considers as one of the most dangerous which touch the basic . the research deals with the effect of change value of new Iraqi situation to be as an attempt , as participation or an excitement that can be occupied a space through the area of questions on the fix and change of moral values shed light on the economical ,social and political events that the Iraqi society passes through them .it is part of interests that becomes importance to everyone through the light of moral change Which is arbitrary to the life of the individual .It is not possible to rebuild the society o

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Guernica Semiotics… methods of Expression between Aesthetic and Semantic Composition
...Show More Authors

This semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) ca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 08 2026
Journal Name
Plos One
Text encryption through bio-inspired DNA and RNA sequencing
...Show More Authors

Cryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Rand

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Federal and problematic relationship between the center and the region in Iraq
...Show More Authors

The US invasion of Iraq in 2003 unleashed the repressed national aspirations of the Kurdish people. After the colonial powers, especially Britain, failed to establish a homeland of scattered Kurds in Iraq, Turkey, Syria and Iran, Iraq's Kurds managed to establish a semi-independent state in the north of the country Which lasted decades against the central authority in Baghdad in protest against what they call the forced integration of Kurds in the Iraqi state, and to obtain more rights and privileges as partners in this country. The federal region in the Kurdistan region of Iraq has become a reality, and it is eager not to strengthen its authority in return for the authority of the central government, but to annex other areas inhabited b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Attitude The King Ghazi a Problem the Border with Kuwait 1933-1939
...Show More Authors

King Ghazi (1933-1939) was of the Arabic characters that characterized national and
patriotic spirit and that faced the British policy in all its aspects.
King Ghazi distinguished as of Arab nationalist tendencies and called for the
liberalization of Arab lands which were under the rule of the Ottoman Empire. He called for
reunification under the one Arab country, Hence came the King invitations to liberate Kuwait
from the British protectorate and consolidated with Iraq.
King Ghazi established a private radio station in the royal palace (AL zzaahoor) palace
and provided special programs to return of Kuwait to Iraq, this radio station was The
prominent role in the revitalization of the Kuwaiti National Movement, an

... Show More
View Publication Preview PDF