Preferred Language
Articles
/
bsj-6398
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of  five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
FACTORY OF SORTING AND RECYCLING OF WASTE IN THE DISTRICT OF AL-MAHMOUDIYAH BETWEEN THE ECONOMIC AND ENVIRONMENTAL IMPACT: FACTORY OF SORTING AND RECYCLING OF WASTE IN THE DISTRICT OF AL-MAHMOUDIYAH BETWEEN THE ECONOMIC AND ENVIRONMENTAL IMPACT
...Show More Authors

The waste sorting and recycling plant in the district of al- Mahmudiya (Yusufiya) is the only laboratory in Baghdad governorate. It is the only one in Iraq that collects and recycles waste. After sorting, we have packages of raw materials (aluminum cans, glass bottles, plastic bottles, Nylon bags) as well as natural fertilizers (food residues and others) and a sanitary landfill with specifications that meet international standards; However, the absence of a structure for the management of the plant (manager, assistant manager, accountant, etc.) in addition to the non-supply of waste on a daily and continuous basis and the lack of cooperation of the Municipality of Baghdad with the management of the plant led to delay in the work

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the causal relationship between agricultural imports and some economic variables in Iraq
...Show More Authors

Foreign trade receives a good deal of economists' attention for its active contribution to economic growth, and imports of goods and services that could not be produced locally constitute an important share of the local economy.  Agricultural imports constitute an important share of the total imports due to their role in fulfilling the needs of local markets; however, the agricultural sector in Iraq contributes no more than a limited share of the country's need, which has encouraged the import of a variety of fruits, vegetables and strategic crops and different types of red and white meat. For the sake of identifying the factors affecting the demand on agricultural imports in Iraq, the following factors has been analyzed: th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Conflict investigation methodology Between the news and the work of the people of the city
...Show More Authors

Praise be to Allah, Lord of the Worlds and prayers to our master and our beloved Muhammad and to his God and companions.
The Sunnah of the prophet completed the prayer and delivery agreed to accept them as evidence of legislation, and the fundamentalists differed in accepting the news of Sundays in the pieces, and most likely if the hadeeth is proven, and completed the correct conditions there is no objection to accept it in branches and pieces. As for the work of the people of the city is one of the evidence adopted when the imam Malik, who is the Imam of the House of the Prophet's blessed immigration, and scientists differ greatly. If you offer a ruling and the ruling of the Hadith of the individual, and the rule of the work of the

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Spectrophotometric Determination of Mesalazine in Pharmaceutical Preparations by Oxidative Coupling Reactions with m-Aminophenol and 2,6- Dihydroxybenzoic Acid
...Show More Authors

     Tow simple, rapid and sensitive spectrophotometric methods for the determination of mesalazine in pharmaceutical preparations have been carried out. The proposed methods depend on oxidative coupling reaction of mesalazine with m-aminophenol in the existence of N-bromosuccinamide in alkaline medium (method A) and 2,6-dihydroxybenzoic acid in the existence of sodium metaperiodate in basic medium (method B) to produce colored products , show highest absorptions at 640 (nm) and 515 (nm), alternately. Beer’s law was consistent in concentrations extent of 1.25-30 and 0.5-12.5 (µg.mL-1) with molar absorptivity of 0.36×104 and 0.77×104 L.mol-1.cm<

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Thu Jun 03 2010
Journal Name
مجلة الاستاذ
أسلوب العطف: دراسة مقارنة بين اللغة العربية والاسبانية
...Show More Authors

أسلوب العطف: دراسة مقارنة بين اللغة العربية والاسبانية

Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
LOS ENUNCIADOS INTERROGATIVOS DIRECTOS: ESTUDIO MORFOLOGLCO CONTRASTIVO ENTRE EL ESPANOL Y EL ARABE
...Show More Authors

Los enunciados interrogativos desempeñan un papel de sumo interés en el habla del ser humano en todo el mundo, además de la gran importancia que desempeñan sus distintos enunciados y partículas en abreviar las oraciones y hacer llegar a nuestro interlocutor nuestra intención con pocas palabras, por eso a través de esta investigación vamos a enfocar la luz sobre uno de sus tipos fundamentales "los enunciados interrogativos directos", a través de un estudio morfológico contrastivo entre el árabe y el español,  este fue el principal motivo para elegir este tema.

A pesar de que los enunciados interrogativos directos aparentemente no ofrecen mucha dificultad, pero dominar a dicho tipo de enunciados con

... Show More
View Publication Preview PDF