Lightweight Image Encryption Using Chacha20 and Serpent Algorithm DOI Creative Commons
Hayder Najm, Mohammed Salih Mahdi,

Wijdan Rashid Abdulhussien

и другие.

Journal of Internet Services and Information Security, Год журнала: 2024, Номер 14(4), С. 436 - 449

Опубликована: Ноя. 30, 2024

Data security is prominent today primarily due to the numerous applications of digital images in contemporary world. Innovations lightweight encryption are being perceived as solutions that would allow enhancing levels protection while incurring minimal impact on size data and speed processes. The having lower complexities a good choice different suites, namely, cloud computing systems using social networks for communication. All users will not have worry about their hacked when sharing images. This paper presents new image technique utilizes ChaCha20 keys generator with 16-round Serpent algorithm provide process. analysis findings indicate suggested cipher capable withstanding both known chosen plaintext attacks. Additionally, it exhibits high degree unpredictability, significant level security, strong sensitivity key variations. assessment methods done assistance equipment through histogram analysis, entropy calculation, correlation mean squared error measurement, peak signal-to-noise ratio unified average change intensity assessment, normalized pixel difference rate structural similarity index. As stated by experimental results, proposed method performs very well adopted various measuring instruments, value information equals 7.98, which nearly equivalent perfect 8. In addition, obtained greater than 99.55%, changing equal 30.11. has been mentioned, decryption process can work well.

Язык: Английский

A Training Program According to Interactive Teaching Strategies and its Impact on Achievement and Creative Problem Solving for Fourth-Grade Preparatory Students in Chemistry DOI Open Access
Suhad Abdul Ameer Abbood

International Journal of Emerging Technologies in Learning (iJET), Год журнала: 2023, Номер 18(04), С. 50 - 65

Опубликована: Фев. 23, 2023

The aim of the research is to know effect a training program based on interactive teaching strategies achievement and creative problem solving among fourth-grade students in chemistry directorate education Rusafa first, sample was divided into two groups, one experimental numbering (29) other control group (30) students. underwent first semester year (2021-2022) studied according usual method. Two tools were built, being an academic test consisting (40) multiple-choice items, second problem-solving skills subject (10) essay questions. results, using t-test for independent samples, showed that there statistically significant difference at level (0.05) favor average scores who applied which strategies.

Язык: Английский

Процитировано

5

A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection DOI Open Access

Raghad Abdulaali Azeez,

Abeer Salim Jamil, Mohammed Salih Mahdi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2023, Номер 17(07), С. 69 - 81

Опубликована: Апрель 5, 2023

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security with compound information, abused situations, participation on global transmission media real-world experiences are extremely significant. For minifying the counting needs for vast size of image info time needful to be address computationally. consequently, partial encryption user-face picked. This study focuses large technique that designed encrypt face slightly. Primarily, dlib utilizing detection. Susan one top edge detectors valuable localization characteristics marked edges, used extract features vectors from user faces. Moreover, relevance suggested generating key led crucial role improvement by producing them as difficult intruders. According PSNR values, recommended algorithms provided an adequate outcome encryption, they had lower encrypting duration larger impact.

Язык: Английский

Процитировано

5

Human Gender and Age Detection Based on Attributes of Face DOI Open Access
Shaimaa H. Shaker, Farah Q. Al-Khalidi

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(10), С. 176 - 190

Опубликована: Май 24, 2022

The main target of the work in this paper is to detect gender and oldness a person with an accurate decision efficient time based on number facial outward attributes extracted using Linear-Discriminate Analysis classify within certain category according his(her) age. This was deal color images via Iterative Dichotomiser3 algorithm as classifier after detected. used Face-Gesture-Recognition-Research-Network aging dataset. All dataset were categorizing into binary categories k-means. followed by process dividing all samples age classes that belonging each specific sex category. Thus, division enabled us reach quick decision. results showed accuracy proposal 90.93%, F-measure 89.4.

Язык: Английский

Процитировано

8

Adaptive HDR Image Blind Watermarking Approach Based on Redundant Discrete Wavelet Transform DOI Open Access

Roa’a M. Al airaji,

Ibtisam A. Aljazaery,

Haider TH. Salim ALRikabi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2023, Номер 17(10), С. 136 - 154

Опубликована: Май 22, 2023

Remarkable success has been recorded in the usage of digital watermarking which is aimed at protecting intellectual property multimedia content. In this paper, a new tone mapping attack-resistant high dynamic range (HDR) image zero-watermarking algorithm proposed. extraction stable and invariant features are extracted for efficient through application redundant discrete wavelet transform (RDWT) to HDR image. The first step involves transforming HVS color space, RDWT implemented using V-channel so that LL sub-band contains strong structure contents obtained. second dividing into non-overlapping blocks, afterwards subjected process transformation use singular value decomposition (SVD) U matrix can be extracted. Third, an Auto-Regressive (AR) prediction technique was employed generating local relationship model comparison done facilitate production binary feature mask. fourth process, hybrid chaotic (HCM) used generate blended watermark security fortified. Lastly, computation effective zero-watermark achieved implementation exclusive-or operation on Based results, approach presented study demonstrated superior performance terms withstanding TM attacks other associated with processing.

Язык: Английский

Процитировано

4

Lightweight Image Encryption Using Chacha20 and Serpent Algorithm DOI Creative Commons
Hayder Najm, Mohammed Salih Mahdi,

Wijdan Rashid Abdulhussien

и другие.

Journal of Internet Services and Information Security, Год журнала: 2024, Номер 14(4), С. 436 - 449

Опубликована: Ноя. 30, 2024

Data security is prominent today primarily due to the numerous applications of digital images in contemporary world. Innovations lightweight encryption are being perceived as solutions that would allow enhancing levels protection while incurring minimal impact on size data and speed processes. The having lower complexities a good choice different suites, namely, cloud computing systems using social networks for communication. All users will not have worry about their hacked when sharing images. This paper presents new image technique utilizes ChaCha20 keys generator with 16-round Serpent algorithm provide process. analysis findings indicate suggested cipher capable withstanding both known chosen plaintext attacks. Additionally, it exhibits high degree unpredictability, significant level security, strong sensitivity key variations. assessment methods done assistance equipment through histogram analysis, entropy calculation, correlation mean squared error measurement, peak signal-to-noise ratio unified average change intensity assessment, normalized pixel difference rate structural similarity index. As stated by experimental results, proposed method performs very well adopted various measuring instruments, value information equals 7.98, which nearly equivalent perfect 8. In addition, obtained greater than 99.55%, changing equal 30.11. has been mentioned, decryption process can work well.

Язык: Английский

Процитировано

1