Lightweight Image Encryption Using Chacha20 and Serpent Algorithm DOI Creative Commons
Hayder Najm, Mohammed Salih Mahdi,

Wijdan Rashid Abdulhussien

и другие.

Journal of Internet Services and Information Security, Год журнала: 2024, Номер 14(4), С. 436 - 449

Опубликована: Ноя. 30, 2024

Data security is prominent today primarily due to the numerous applications of digital images in contemporary world. Innovations lightweight encryption are being perceived as solutions that would allow enhancing levels protection while incurring minimal impact on size data and speed processes. The having lower complexities a good choice different suites, namely, cloud computing systems using social networks for communication. All users will not have worry about their hacked when sharing images. This paper presents new image technique utilizes ChaCha20 keys generator with 16-round Serpent algorithm provide process. analysis findings indicate suggested cipher capable withstanding both known chosen plaintext attacks. Additionally, it exhibits high degree unpredictability, significant level security, strong sensitivity key variations. assessment methods done assistance equipment through histogram analysis, entropy calculation, correlation mean squared error measurement, peak signal-to-noise ratio unified average change intensity assessment, normalized pixel difference rate structural similarity index. As stated by experimental results, proposed method performs very well adopted various measuring instruments, value information equals 7.98, which nearly equivalent perfect 8. In addition, obtained greater than 99.55%, changing equal 30.11. has been mentioned, decryption process can work well.

Язык: Английский

Transforming healthcare and fitness with AI powered next-generation smart clothing DOI Creative Commons
Anurag Yadav, Kusum Yadav

Discover Electrochemistry., Год журнала: 2025, Номер 2(1)

Опубликована: Март 17, 2025

Язык: Английский

Процитировано

0

A Novel Method of Invisible Video Watermarking Based on Index Mapping and Hybrid DWT-DCT DOI Open Access
Hussein Tuama Hazim,

Nawar Alseelawi,

Haider TH. Salim ALRikabi

и другие.

International Journal of Online and Biomedical Engineering (iJOE), Год журнала: 2023, Номер 19(04), С. 155 - 173

Опубликована: Апрель 3, 2023

Watermarking is widely used in multimedia preservation and communication, which comprises, therefore not limited to, data security validation. Security, readability, imperceptibility, resilience are some of the key advantages this technology. However, there still certain issues that need to be addressed, such as ability withstand a variety assaults without substantially affecting quality value embedded data. Based on its operational domain, watermarking technology may divided into two groups: spatial frequency watermarking. An index mapping-based approach for copyright protection multi-media color videos presented paper. We offer hybrid discrete wavelet transform cosine (DCT) algorithm digital video watermark. Peak signal noise ratio (PSNR), similarity structure measure (SSIM), have been analyze distortion produced by It suggested proposed method provides greater imperceptibility conjunction with each other human visual system it offers higher robustness against different attacks.

Язык: Английский

Процитировано

11

Blockchain-based student certificate management and system sharing using hyperledger fabric platform DOI Open Access
Rana Fareed Ghani,

Asia A. Salman,

Abdullah B. Khudhair

и другие.

Periodicals of Engineering and Natural Sciences (PEN), Год журнала: 2022, Номер 10(2), С. 207 - 207

Опубликована: Апрель 15, 2022

One of the major capabilities blockchain technology is sharing data in verifiable ways without losing control information possession. Issuing and verifying student certifications for higher study applications or job recruitment require many steps that take days to complete are considered time-consuming. Most universities around world use centralized systems entire procedure when a graduate applies postgraduate studies. Applying certificate verification protocols through comprehensive architecture provides authenticity reduces time significantly. In this paper, framework has been proposed issue locally addition them across internet while maintaining ownership certifications. This leverages advantages electronic certification verification. blockchain-based system will provide low latency issuing, sharing, these The paper presents e-certification an evaluation framework, which consists measuring average transaction time.

Язык: Английский

Процитировано

17

Digital citizenship for faculty of Iraqi universities DOI Open Access

Maha Saleem Kahlaf Wahib,

Zainab Aziz Ahmed Alamiry,

Ban Hassan Majeed

и другие.

Periodicals of Engineering and Natural Sciences (PEN), Год журнала: 2023, Номер 11(2), С. 262 - 262

Опубликована: Апрель 11, 2023

Digital Citizenship (DC) is a set of rules, controls, standards, norms, ideas, and principles followed in the optimal proper use technology, which citizens, young old, need to contribute progress nation. In short, it guidance protection, benefits modern technologies, protection from their dangers. Or more precisely, smart approach technology. The concept digital citizenship has strong relationship with education system, so academics higher scientific research institutions must be most experienced, effective among students this field. Especially after Corona pandemic trend that universe gone through towards using internet all areas life, including education, especially integrated become very important for citizen digital. This study dealt sample university professors (200) questionnaires. All who belong colleges human specialization possess citizenship. There are no differences between gender except axis, was favor teaching staff male. addition specialization, science.

Язык: Английский

Процитировано

10

Analysis of the problems of electricity in Iraq and recommendations of methods of overcoming them DOI Open Access
Hisham Dawood Salman Altai, Faisal Theyab Abed, Mohammed H. Lazim

и другие.

Periodicals of Engineering and Natural Sciences (PEN), Год журнала: 2022, Номер 10(1), С. 607 - 607

Опубликована: Фев. 17, 2022

The Iraqi power sector is at a critical stage that requires urgent reforms. Concerns regarding the ability of system to provide steady and its operational inefficiencies, in general, have been expressed by industry academia. Currently, experiencing one highest demand growth world, given it capital intensive, takes up large share Iraq's government investment program. More so, there huge increase financial burden electricity supply due high subsidies required for coverage recurrent expenditure. This subsidy regarded as extremely low traffic which does not cover 20% periodic Apart from tariff, another major indirect socioeconomic fact over-staffed with over 50,000 employees under normal circumstances should be more than 15,000. estimated annual cost aforementioned inefficiencies insufficient about $3 4 billion. In 2013, 70% generated was lost, this loss three areas, including commercial, technical, administrative losses. Therefore, need massive reforms are targeted addressing entire issue. can achieved through engagement private sector, higher competition, introduction novel regulatory legislative frameworks. addition that, available sources energy Iraq optimized alongside gas usage related oil extraction, while solar explored hybridization current stations.

Язык: Английский

Процитировано

14

USING SPECIAL LETTERS AND DIACRITICS IN STEGANOGRAPHY IN HOLY QURAN DOI Creative Commons

Nooruldeen Subhi Shakir,

Mohammed Salih Mahdi

Iraqi Journal for Computers and Informatics, Год журнала: 2023, Номер 49(2), С. 1 - 8

Опубликована: Авг. 14, 2023

Because of the great development that took place in information transfer and communication technologies, issue security has become a very sensitive resonant issue, importance must be given to protecting this confidential information. Steganography is one important effective ways protect while it being transmitted through Internet, steganography technology hide inside an unnoticeable envelope object can image, video, text or sound. The Arabic language some special features make excellent covers from Through diversity letters dotted several forms vowels letters, Holy Qur’an considered cover rich movements grammar, which makes wide for purpose concealing sacred book where not permissible modify, add move any diacritical mark it. algorithm hides two bits by uses six language. Moreover, checks presence specific linguistic referred diacritics. proposed system achieved high ability as Surat Al-Baqarah (4524 bits) also (2576 Al-Imran Al-An’am (2318 bits).

Язык: Английский

Процитировано

8

Mathematical connection skills and their relationship with productive thinking among secondary school students DOI Open Access

Lina Fouad Jawad

Periodicals of Engineering and Natural Sciences (PEN), Год журнала: 2022, Номер 10(1), С. 421 - 421

Опубликована: Фев. 7, 2022

In recent times, it has increasingly become imperative to demonstrate the function which mathematics plays in different aspects of life general, especially terms solving problems and decision-making. Mathematics is applied that individuals society at large are faced with daily. Also, a crucial role lives students by enabling them prepare for challenges through creation positive interaction between real-life situations, development their mental capabilities problem-solving creativity. It also helps be responsible develop self-confidence. This research seeks find out whether there correlation learners' ability connect its branches other sciences, as well daily think productively. achieved using two statistical tests, whereby one tests used determining mathematical connection skills possessed learners, while employed measure productive thinking among learners. A sample 300 fourth-grade science from Baghdad was study. The results analyses revealed skill positively correlated thinking.

Язык: Английский

Процитировано

11

Enhancement of the efficiency of solar energy cells by selecting suitable places based on the simulation of PV System DOI Open Access
Faisal Theyab Abed, Hisham Dawood Salman Altai, Hussein Tuama Hazim

и другие.

Periodicals of Engineering and Natural Sciences (PEN), Год журнала: 2022, Номер 10(2), С. 80 - 80

Опубликована: Март 13, 2022

At present, the increasing demand for electrical energy and presence of renewable sources in various forms world and, particularly Iraq, such as solar wind energy, have become focus researchers' attention. Huge efforts are focused on finding ways to use ecologically friendly generate electricity eliminate fossil fuels. In this study paper, we propose a simulation program discover ideal location cell amount time be exposed sun's rays, so that home powered by can built. Also, through program, losses were calculated accompany conversion light into find necessary solutions make work with high efficiency.

Язык: Английский

Процитировано

10

Image Encryption Based on Multi-Level Keys on RC5 Algorithm DOI Open Access
Abeer Salim Jamil, Abdul Monem S. Rahma

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(17), С. 101 - 115

Опубликована: Сен. 8, 2022

In recent years, the need to develop encryption algorithms has led an increase in working and efficiency of protect transmission reception information from any security breach. The RC5 type algorithm is most common closest perfection symmetry algorithms, knowing that it faces many problems which data collection was limited because occurs only twice by on its also, used for 1 function (XOR) through process. A research report digital image development developing makes more secure adding a new level (using two keys) thus increasing key space. decryption process can be done substituting XOR operation applied Sixteen rounds with (#) based use 2 keys, each consisting 4 states (0,1,2,3) instead using traditional uses (0,1). This increases robustness hacking methods.

Язык: Английский

Процитировано

9

An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments DOI Open Access
Abeer Salim Jamil,

Raghad Abdulaali Azeez,

Nidaa Flaih Hassan

и другие.

International Journal of Online and Biomedical Engineering (iJOE), Год журнала: 2023, Номер 19(01), С. 93 - 106

Опубликована: Янв. 17, 2023

Cyber security is a term utilized for describing collection of technologies, procedures, and practices that try protecting an online environment user or organization. For medical images among most important delicate data kinds in computer systems, the reasons require all patient data, including images, be encrypted before being transferred over networks by healthcare companies. This paper presents new direction encryption method research encrypting image based on domain feature extracted to generate key process. The process started applying edges detection. After dividing bits edge into (3×3) windows, diffusions are applied create used image. Four randomness tests passed through NIST ensure whether generated accepted as true. reversible state decryption retrieve original will gained can any cyber field such comparative experiments prove proposed algorithm improves efficiency has good performance, higher information entropy 7.42 well lower correlation coefficient 0.653.

Язык: Английский

Процитировано

5