Preferred Language
Articles
/
bsj-8361
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Tue Sep 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Remineralizing Toothpastes on Enamel Surface Roughness after Hybrid Laser Bleaching (An In vitro Study)
...Show More Authors

Background: one of the complications of power bleaching is surface roughness of enamel which increases the possibility of post bleaching teeth discoloration. The aim of the present study is to evaluate the effect of toothpaste containing nano hydroxyapatite, NovaMin and kin sense fluoride on surface roughness of human tooth enamel after laser bleaching with 35% hydrogen peroxide bleaching gel. Materials and Methods: Twenty human enamel incisors were cleaned and their labial surface polished up to #1200, then categorized into four equal groups; first group kept without bleaching as a control group, while the remaining three experimental groups were bleached with 35% hydrogen peroxide, and each group treated with a restore paste containing o

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction a

... Show More
View Publication
Scopus (10)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc

... Show More
Scopus (10)
Scopus
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref