Journal of Internet Services and Information Security,
Год журнала:
2024,
Номер
14(4), С. 436 - 449
Опубликована: Ноя. 30, 2024
Data
security
is
prominent
today
primarily
due
to
the
numerous
applications
of
digital
images
in
contemporary
world.
Innovations
lightweight
encryption
are
being
perceived
as
solutions
that
would
allow
enhancing
levels
protection
while
incurring
minimal
impact
on
size
data
and
speed
processes.
The
having
lower
complexities
a
good
choice
different
suites,
namely,
cloud
computing
systems
using
social
networks
for
communication.
All
users
will
not
have
worry
about
their
hacked
when
sharing
images.
This
paper
presents
new
image
technique
utilizes
ChaCha20
keys
generator
with
16-round
Serpent
algorithm
provide
process.
analysis
findings
indicate
suggested
cipher
capable
withstanding
both
known
chosen
plaintext
attacks.
Additionally,
it
exhibits
high
degree
unpredictability,
significant
level
security,
strong
sensitivity
key
variations.
assessment
methods
done
assistance
equipment
through
histogram
analysis,
entropy
calculation,
correlation
mean
squared
error
measurement,
peak
signal-to-noise
ratio
unified
average
change
intensity
assessment,
normalized
pixel
difference
rate
structural
similarity
index.
As
stated
by
experimental
results,
proposed
method
performs
very
well
adopted
various
measuring
instruments,
value
information
equals
7.98,
which
nearly
equivalent
perfect
8.
In
addition,
obtained
greater
than
99.55%,
changing
equal
30.11.
has
been
mentioned,
decryption
process
can
work
well.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(04), С. 155 - 173
Опубликована: Апрель 3, 2023
Watermarking
is
widely
used
in
multimedia
preservation
and
communication,
which
comprises,
therefore
not
limited
to,
data
security
validation.
Security,
readability,
imperceptibility,
resilience
are
some
of
the
key
advantages
this
technology.
However,
there
still
certain
issues
that
need
to
be
addressed,
such
as
ability
withstand
a
variety
assaults
without
substantially
affecting
quality
value
embedded
data.
Based
on
its
operational
domain,
watermarking
technology
may
divided
into
two
groups:
spatial
frequency
watermarking.
An
index
mapping-based
approach
for
copyright
protection
multi-media
color
videos
presented
paper.
We
offer
hybrid
discrete
wavelet
transform
cosine
(DCT)
algorithm
digital
video
watermark.
Peak
signal
noise
ratio
(PSNR),
similarity
structure
measure
(SSIM),
have
been
analyze
distortion
produced
by
It
suggested
proposed
method
provides
greater
imperceptibility
conjunction
with
each
other
human
visual
system
it
offers
higher
robustness
against
different
attacks.
Periodicals of Engineering and Natural Sciences (PEN),
Год журнала:
2022,
Номер
10(2), С. 207 - 207
Опубликована: Апрель 15, 2022
One
of
the
major
capabilities
blockchain
technology
is
sharing
data
in
verifiable
ways
without
losing
control
information
possession.
Issuing
and
verifying
student
certifications
for
higher
study
applications
or
job
recruitment
require
many
steps
that
take
days
to
complete
are
considered
time-consuming.
Most
universities
around
world
use
centralized
systems
entire
procedure
when
a
graduate
applies
postgraduate
studies.
Applying
certificate
verification
protocols
through
comprehensive
architecture
provides
authenticity
reduces
time
significantly.
In
this
paper,
framework
has
been
proposed
issue
locally
addition
them
across
internet
while
maintaining
ownership
certifications.
This
leverages
advantages
electronic
certification
verification.
blockchain-based
system
will
provide
low
latency
issuing,
sharing,
these
The
paper
presents
e-certification
an
evaluation
framework,
which
consists
measuring
average
transaction
time.
Periodicals of Engineering and Natural Sciences (PEN),
Год журнала:
2023,
Номер
11(2), С. 262 - 262
Опубликована: Апрель 11, 2023
Digital
Citizenship
(DC)
is
a
set
of
rules,
controls,
standards,
norms,
ideas,
and
principles
followed
in
the
optimal
proper
use
technology,
which
citizens,
young
old,
need
to
contribute
progress
nation.
In
short,
it
guidance
protection,
benefits
modern
technologies,
protection
from
their
dangers.
Or
more
precisely,
smart
approach
technology.
The
concept
digital
citizenship
has
strong
relationship
with
education
system,
so
academics
higher
scientific
research
institutions
must
be
most
experienced,
effective
among
students
this
field.
Especially
after
Corona
pandemic
trend
that
universe
gone
through
towards
using
internet
all
areas
life,
including
education,
especially
integrated
become
very
important
for
citizen
digital.
This
study
dealt
sample
university
professors
(200)
questionnaires.
All
who
belong
colleges
human
specialization
possess
citizenship.
There
are
no
differences
between
gender
except
axis,
was
favor
teaching
staff
male.
addition
specialization,
science.
Periodicals of Engineering and Natural Sciences (PEN),
Год журнала:
2022,
Номер
10(1), С. 607 - 607
Опубликована: Фев. 17, 2022
The
Iraqi
power
sector
is
at
a
critical
stage
that
requires
urgent
reforms.
Concerns
regarding
the
ability
of
system
to
provide
steady
and
its
operational
inefficiencies,
in
general,
have
been
expressed
by
industry
academia.
Currently,
experiencing
one
highest
demand
growth
world,
given
it
capital
intensive,
takes
up
large
share
Iraq's
government
investment
program.
More
so,
there
huge
increase
financial
burden
electricity
supply
due
high
subsidies
required
for
coverage
recurrent
expenditure.
This
subsidy
regarded
as
extremely
low
traffic
which
does
not
cover
20%
periodic
Apart
from
tariff,
another
major
indirect
socioeconomic
fact
over-staffed
with
over
50,000
employees
under
normal
circumstances
should
be
more
than
15,000.
estimated
annual
cost
aforementioned
inefficiencies
insufficient
about
$3
4
billion.
In
2013,
70%
generated
was
lost,
this
loss
three
areas,
including
commercial,
technical,
administrative
losses.
Therefore,
need
massive
reforms
are
targeted
addressing
entire
issue.
can
achieved
through
engagement
private
sector,
higher
competition,
introduction
novel
regulatory
legislative
frameworks.
addition
that,
available
sources
energy
Iraq
optimized
alongside
gas
usage
related
oil
extraction,
while
solar
explored
hybridization
current
stations.
Iraqi Journal for Computers and Informatics,
Год журнала:
2023,
Номер
49(2), С. 1 - 8
Опубликована: Авг. 14, 2023
Because
of
the
great
development
that
took
place
in
information
transfer
and
communication
technologies,
issue
security
has
become
a
very
sensitive
resonant
issue,
importance
must
be
given
to
protecting
this
confidential
information.
Steganography
is
one
important
effective
ways
protect
while
it
being
transmitted
through
Internet,
steganography
technology
hide
inside
an
unnoticeable
envelope
object
can
image,
video,
text
or
sound.
The
Arabic
language
some
special
features
make
excellent
covers
from
Through
diversity
letters
dotted
several
forms
vowels
letters,
Holy
Qur’an
considered
cover
rich
movements
grammar,
which
makes
wide
for
purpose
concealing
sacred
book
where
not
permissible
modify,
add
move
any
diacritical
mark
it.
algorithm
hides
two
bits
by
uses
six
language.
Moreover,
checks
presence
specific
linguistic
referred
diacritics.
proposed
system
achieved
high
ability
as
Surat
Al-Baqarah
(4524
bits)
also
(2576
Al-Imran
Al-An’am
(2318
bits).
Periodicals of Engineering and Natural Sciences (PEN),
Год журнала:
2022,
Номер
10(1), С. 421 - 421
Опубликована: Фев. 7, 2022
In
recent
times,
it
has
increasingly
become
imperative
to
demonstrate
the
function
which
mathematics
plays
in
different
aspects
of
life
general,
especially
terms
solving
problems
and
decision-making.
Mathematics
is
applied
that
individuals
society
at
large
are
faced
with
daily.
Also,
a
crucial
role
lives
students
by
enabling
them
prepare
for
challenges
through
creation
positive
interaction
between
real-life
situations,
development
their
mental
capabilities
problem-solving
creativity.
It
also
helps
be
responsible
develop
self-confidence.
This
research
seeks
find
out
whether
there
correlation
learners'
ability
connect
its
branches
other
sciences,
as
well
daily
think
productively.
achieved
using
two
statistical
tests,
whereby
one
tests
used
determining
mathematical
connection
skills
possessed
learners,
while
employed
measure
productive
thinking
among
learners.
A
sample
300
fourth-grade
science
from
Baghdad
was
study.
The
results
analyses
revealed
skill
positively
correlated
thinking.
Periodicals of Engineering and Natural Sciences (PEN),
Год журнала:
2022,
Номер
10(2), С. 80 - 80
Опубликована: Март 13, 2022
At
present,
the
increasing
demand
for
electrical
energy
and
presence
of
renewable
sources
in
various
forms
world
and,
particularly
Iraq,
such
as
solar
wind
energy,
have
become
focus
researchers'
attention.
Huge
efforts
are
focused
on
finding
ways
to
use
ecologically
friendly
generate
electricity
eliminate
fossil
fuels.
In
this
study
paper,
we
propose
a
simulation
program
discover
ideal
location
cell
amount
time
be
exposed
sun's
rays,
so
that
home
powered
by
can
built.
Also,
through
program,
losses
were
calculated
accompany
conversion
light
into
find
necessary
solutions
make
work
with
high
efficiency.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(17), С. 101 - 115
Опубликована: Сен. 8, 2022
In
recent
years,
the
need
to
develop
encryption
algorithms
has
led
an
increase
in
working
and
efficiency
of
protect
transmission
reception
information
from
any
security
breach.
The
RC5
type
algorithm
is
most
common
closest
perfection
symmetry
algorithms,
knowing
that
it
faces
many
problems
which
data
collection
was
limited
because
occurs
only
twice
by
on
its
also,
used
for
1
function
(XOR)
through
process.
A
research
report
digital
image
development
developing
makes
more
secure
adding
a
new
level
(using
two
keys)
thus
increasing
key
space.
decryption
process
can
be
done
substituting
XOR
operation
applied
Sixteen
rounds
with
(#)
based
use
2
keys,
each
consisting
4
states
(0,1,2,3)
instead
using
traditional
uses
(0,1).
This
increases
robustness
hacking
methods.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(01), С. 93 - 106
Опубликована: Янв. 17, 2023
Cyber
security
is
a
term
utilized
for
describing
collection
of
technologies,
procedures,
and
practices
that
try
protecting
an
online
environment
user
or
organization.
For
medical
images
among
most
important
delicate
data
kinds
in
computer
systems,
the
reasons
require
all
patient
data,
including
images,
be
encrypted
before
being
transferred
over
networks
by
healthcare
companies.
This
paper
presents
new
direction
encryption
method
research
encrypting
image
based
on
domain
feature
extracted
to
generate
key
process.
The
process
started
applying
edges
detection.
After
dividing
bits
edge
into
(3×3)
windows,
diffusions
are
applied
create
used
image.
Four
randomness
tests
passed
through
NIST
ensure
whether
generated
accepted
as
true.
reversible
state
decryption
retrieve
original
will
gained
can
any
cyber
field
such
comparative
experiments
prove
proposed
algorithm
improves
efficiency
has
good
performance,
higher
information
entropy
7.42
well
lower
correlation
coefficient
0.653.