Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.
Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreGender and culture are among the factors that influence the process of understanding and interpreting different types of communication, especially images. The current study, which is a part of a master’s thesis, aims at investigating the role of gender and culture in interpreting and understanding the caricatures that deal with women’s issues in Arab societies. To this end, the researchers adopted Barthes’ (1957) concepts of denotation and connotation in his theory of mythologies in addition to Langacker’s (1987) theory of (Domains). The research concludes that the female subjects have better cognitive abilities in investing the signs within the selected caricatures. The other factor the study reached to is that the respondents
... Show MoreThe research addresses a fundamental Islamic jurisprudential Purposeful issue, which is (Sharia), and to indicate the impact of this on Islamic jurisprudence, deriving rulings and extracting purposes, and to repel the illusion that this issue is only doctrinal, and clarifying the aspects of similarities and links between them by explaining the origin of deriving the purposes of Islamic Law (Sharia) through the meanings and wisdom learned from the texts and the explanation of the rulings. The rulings of Islamic Law (Sharia) have urged bringing benefits and repelling harms, and that the path to do so is reason and its production. I began the research by defining the purposes of Islamic Law (Sharia), then defining the rule of rational right
... Show MoreThis paper deals the prediction of the process of random spatial data of two properties, the first is called Primary variables and the second is called secondary variables , the method that were used in the prediction process for this type of data is technique Co-kriging , the method is usually used when the number of primary variables meant to predict for one of its elements is measured in a particular location a few (because of the cost or difficulty of obtaining them) compare with secondary variable which is the number of elements are available and highly correlated with primary variables, as was the&nbs
... Show MoreThe principal components analysis is used in analyzing many economic and social phenomena; and one of them is related to a large group in our society who are the university instructors. This phenomenon is the delay occurred in getting university instructor to his next scientific title. And as the determination of the principal components number inside the principal components depends on using many methods, we have compared between three of these methods that are: (BARTLETT, SCREE DIAGRAM, JOLLIFFE).
We concluded that JOLLIFFE method was the best one in analyzing the studying phenomenon data among these three methods, we found the most distinguishing factors effecting on t
... Show Moreالملخص: لتحقيق أهداف البحث قامت الباحثة اعداد مقياس التلكؤ الاكاديمي اعتمادا على نظرية (باندورا) وتكون المقياس بصورته النهائية من (21) فقرة ، وطبق المقياس على عينة البحث البالغة (100) طالب وطالبة تم اختيارهم بالطريقة العشوائية البسيطة من مجتمع البحث ،وبعد جمع البيانات تم معالجتها باستعمال الوسائل الإحصائية المناسبة، توصل البحث الى النتائج الأتية : الى ان الطلبة ليس لديهم تلكؤ اكاديمي و اعلى من المتوسط، لا توج
... Show MorePurpose: The diagnosis and determine the level of balance between the time available for life and work with the doctors in the hospitals of t the six hospitals in the City of Medicine.
Design / methodology / Approach: It has been relying on ready-scale, to make sure the diagnosis and determine the level of balance between the time available for life and work, where they were distributed on Form 42 doctors in the six hospitals in the City of Medicine, were analyzed by software (Nvivo and SPSS v.22).
Results: The results showed that there is a good level of balance between the time available for life and work with the doctors.
Research limitations: The diffi
... Show Morethe research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreIn a report by Transparency Organization in 2010, Iraq has 200 newspapers, magazines, sixty-seven radio stations and 45 satellite TV channels. The increase in these figures is measured in days or weeks and not months and years. This fact confirms the importance of studying content providers, especially youth sports content, for two reasons: the first is that young people constitute the highest percentage in Iraqi society, with all the potential involved in shaping the future aspects; the second reason is that for years sport has become an important pillar in people's lives not only in the entertainment aspect as it was seen in the past; Rather, sport has an influential presence in politi
... Show More