Journal of Internet Services and Information Security,
Год журнала:
2024,
Номер
14(4), С. 436 - 449
Опубликована: Ноя. 30, 2024
Data
security
is
prominent
today
primarily
due
to
the
numerous
applications
of
digital
images
in
contemporary
world.
Innovations
lightweight
encryption
are
being
perceived
as
solutions
that
would
allow
enhancing
levels
protection
while
incurring
minimal
impact
on
size
data
and
speed
processes.
The
having
lower
complexities
a
good
choice
different
suites,
namely,
cloud
computing
systems
using
social
networks
for
communication.
All
users
will
not
have
worry
about
their
hacked
when
sharing
images.
This
paper
presents
new
image
technique
utilizes
ChaCha20
keys
generator
with
16-round
Serpent
algorithm
provide
process.
analysis
findings
indicate
suggested
cipher
capable
withstanding
both
known
chosen
plaintext
attacks.
Additionally,
it
exhibits
high
degree
unpredictability,
significant
level
security,
strong
sensitivity
key
variations.
assessment
methods
done
assistance
equipment
through
histogram
analysis,
entropy
calculation,
correlation
mean
squared
error
measurement,
peak
signal-to-noise
ratio
unified
average
change
intensity
assessment,
normalized
pixel
difference
rate
structural
similarity
index.
As
stated
by
experimental
results,
proposed
method
performs
very
well
adopted
various
measuring
instruments,
value
information
equals
7.98,
which
nearly
equivalent
perfect
8.
In
addition,
obtained
greater
than
99.55%,
changing
equal
30.11.
has
been
mentioned,
decryption
process
can
work
well.
International Journal of Emerging Technologies in Learning (iJET),
Год журнала:
2023,
Номер
18(04), С. 50 - 65
Опубликована: Фев. 23, 2023
The
aim
of
the
research
is
to
know
effect
a
training
program
based
on
interactive
teaching
strategies
achievement
and
creative
problem
solving
among
fourth-grade
students
in
chemistry
directorate
education
Rusafa
first,
sample
was
divided
into
two
groups,
one
experimental
numbering
(29)
other
control
group
(30)
students.
underwent
first
semester
year
(2021-2022)
studied
according
usual
method.
Two
tools
were
built,
being
an
academic
test
consisting
(40)
multiple-choice
items,
second
problem-solving
skills
subject
(10)
essay
questions.
results,
using
t-test
for
independent
samples,
showed
that
there
statistically
significant
difference
at
level
(0.05)
favor
average
scores
who
applied
which
strategies.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(07), С. 69 - 81
Опубликована: Апрель 5, 2023
User
confidentiality
protection
is
concerning
a
topic
in
control
and
monitoring
spaces.
In
image,
user's
faces
security
with
compound
information,
abused
situations,
participation
on
global
transmission
media
real-world
experiences
are
extremely
significant.
For
minifying
the
counting
needs
for
vast
size
of
image
info
time
needful
to
be
address
computationally.
consequently,
partial
encryption
user-face
picked.
This
study
focuses
large
technique
that
designed
encrypt
face
slightly.
Primarily,
dlib
utilizing
detection.
Susan
one
top
edge
detectors
valuable
localization
characteristics
marked
edges,
used
extract
features
vectors
from
user
faces.
Moreover,
relevance
suggested
generating
key
led
crucial
role
improvement
by
producing
them
as
difficult
intruders.
According
PSNR
values,
recommended
algorithms
provided
an
adequate
outcome
encryption,
they
had
lower
encrypting
duration
larger
impact.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(10), С. 176 - 190
Опубликована: Май 24, 2022
The
main
target
of
the
work
in
this
paper
is
to
detect
gender
and
oldness
a
person
with
an
accurate
decision
efficient
time
based
on
number
facial
outward
attributes
extracted
using
Linear-Discriminate
Analysis
classify
within
certain
category
according
his(her)
age.
This
was
deal
color
images
via
Iterative
Dichotomiser3
algorithm
as
classifier
after
detected.
used
Face-Gesture-Recognition-Research-Network
aging
dataset.
All
dataset
were
categorizing
into
binary
categories
k-means.
followed
by
process
dividing
all
samples
age
classes
that
belonging
each
specific
sex
category.
Thus,
division
enabled
us
reach
quick
decision.
results
showed
accuracy
proposal
90.93%,
F-measure
89.4.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(10), С. 136 - 154
Опубликована: Май 22, 2023
Remarkable
success
has
been
recorded
in
the
usage
of
digital
watermarking
which
is
aimed
at
protecting
intellectual
property
multimedia
content.
In
this
paper,
a
new
tone
mapping
attack-resistant
high
dynamic
range
(HDR)
image
zero-watermarking
algorithm
proposed.
extraction
stable
and
invariant
features
are
extracted
for
efficient
through
application
redundant
discrete
wavelet
transform
(RDWT)
to
HDR
image.
The
first
step
involves
transforming
HVS
color
space,
RDWT
implemented
using
V-channel
so
that
LL
sub-band
contains
strong
structure
contents
obtained.
second
dividing
into
non-overlapping
blocks,
afterwards
subjected
process
transformation
use
singular
value
decomposition
(SVD)
U
matrix
can
be
extracted.
Third,
an
Auto-Regressive
(AR)
prediction
technique
was
employed
generating
local
relationship
model
comparison
done
facilitate
production
binary
feature
mask.
fourth
process,
hybrid
chaotic
(HCM)
used
generate
blended
watermark
security
fortified.
Lastly,
computation
effective
zero-watermark
achieved
implementation
exclusive-or
operation
on
Based
results,
approach
presented
study
demonstrated
superior
performance
terms
withstanding
TM
attacks
other
associated
with
processing.
Journal of Internet Services and Information Security,
Год журнала:
2024,
Номер
14(4), С. 436 - 449
Опубликована: Ноя. 30, 2024
Data
security
is
prominent
today
primarily
due
to
the
numerous
applications
of
digital
images
in
contemporary
world.
Innovations
lightweight
encryption
are
being
perceived
as
solutions
that
would
allow
enhancing
levels
protection
while
incurring
minimal
impact
on
size
data
and
speed
processes.
The
having
lower
complexities
a
good
choice
different
suites,
namely,
cloud
computing
systems
using
social
networks
for
communication.
All
users
will
not
have
worry
about
their
hacked
when
sharing
images.
This
paper
presents
new
image
technique
utilizes
ChaCha20
keys
generator
with
16-round
Serpent
algorithm
provide
process.
analysis
findings
indicate
suggested
cipher
capable
withstanding
both
known
chosen
plaintext
attacks.
Additionally,
it
exhibits
high
degree
unpredictability,
significant
level
security,
strong
sensitivity
key
variations.
assessment
methods
done
assistance
equipment
through
histogram
analysis,
entropy
calculation,
correlation
mean
squared
error
measurement,
peak
signal-to-noise
ratio
unified
average
change
intensity
assessment,
normalized
pixel
difference
rate
structural
similarity
index.
As
stated
by
experimental
results,
proposed
method
performs
very
well
adopted
various
measuring
instruments,
value
information
equals
7.98,
which
nearly
equivalent
perfect
8.
In
addition,
obtained
greater
than
99.55%,
changing
equal
30.11.
has
been
mentioned,
decryption
process
can
work
well.