12 research outputs found

    Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption

    Get PDF
    استرجاع الصور المستند إلى المحتوى (CBIR) هو تقنية تستخدم لاسترداد الصور من قاعدة بيانات الصور. ومع ذلك، فإن عملية CBIR تعاني من دقة أقل في استرداد الصور من قاعدة بيانات صور واسعة النطاق وضمان خصوصية الصور. تهدف هذه الورقة إلى معالجة قضايا الدقة باستخدام تقنيات التعلم العميق كطريقة CNN. أيضًا، توفير الخصوصية اللازمة للصور باستخدام طرق تشفير متماثلة تمامًا بواسطة Cheon و Kim و Kim و Song (CKKS). ولتحقيق هذه الأهداف تم اقتراح نظام RCNN_CKKS يتضمن جزأين. يستخرج الجزء الأول (المعالجة دون اتصال بالإنترنت–) لاستخراج الخصائص العالية المستوى استنادًا إلى طبقة التسطيح في شبكة عصبية تلافيفية (CNN) ثم يخزن هذه الميزات في مجموعة بيانات جديدة. في الجزء الثاني (المعالجة عبر الإنترنت) ، يرسل العميل الصورة المشفرة إلى الخادم ، والتي تعتمد على نموذج CNN المدرب لاستخراج ميزات الصورة المرسلة. بعد ذلك، تتم مقارنة الميزات المستخرجة مع الميزات المخزنة باستخدام طريقة Hamming Distance لاسترداد جميع الصور المتشابهة. أخيرًا، يقوم الخادم بتشفير جميع الصور المسترجعة وإرسالها إلى العميل. كانت نتائج التعلم العميق على الصور العادية 97.94٪ للتصنيف و98.94٪ للصور المسترجعة. في الوقت نفسه، تم استخدام اختبار NIST للتحقق من أمان CKKS عند تطبيقه على مجموعة بيانات المعهد الكندي للأبحاث المتقدمة (CIFAR-10). من خلال هذه النتائج، استنتج الباحثون أن التعلم العميق هو وسيلة فعالة لاستعادة الصور وأن طريقة CKKS مناسبة لحماية خصوصية الصورة.A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection

    Forecasting the Exchange Rates of the Iraqi Dinar against the US Dollar using the Time Series model (ARIMA)

    Get PDF
    Estimating the exchange rate is considered a key tool for economic planning and reaching economic stability. This study aims to reach the best model for predicting exchange rates of Iraqi Dinar against the U.S. dollar in the period (2008-2017). For this purpose the following methods have been adopted: - Time-series analysis using the Box – Jenkins approach.                 Forecasts obtained from the two models were compared using both mean of the absolute values of the errors (MAE) and the square root of the mean square error (RMSE). The ARIMA (1,1,1) model produced the best forecasts and it can be used as a reliable method of estimating the exchange rate of any foreign currency

    Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder

    Get PDF
    Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly. This new system is thoroughly analyzed by the help of the bifurcation diagram, Lyapunov exponents' spectrum, and entropy measurement. Bifurcation analysis of the proposed system with two initiation methods reveals its multistability. As an engineering application, the system's efficiency is tested in image encryption. The complexity of the chaotic attractor of the proposed system makes it a proper choice for encryption. States of the chaotic attractor are used to shue the rows and columns of the image, and then the shued image is XORed with the states of chaotic attractor. The unpredictability of the chaotic attractor makes the encryption method very safe. The performance of the encryption method is analyzed using the histogram, correlation coefficient, Shannon entropy, and encryption quality. The results show that the encryption method using the proposed chaotic system has reliable performance. - 2019 by the authors.Scopu

    Finding the Relevance Degree between an English Text and its Title

    Get PDF
    Keywords are useful tools as they give the shorter summary of the document. Keywords are useful for a variety of purposes including summarizing, indexing, labeling, categorization, clustering, and searching, and in this paper we will use keywords in order to find the relevance degree between an English text and its title. The proposed system solves this problem through simple statistic (Term frequency) and linguistic approaches by extracting the keywords of the title and keywords of the text (with their frequency that appear in the text) and finding the average of title's keywords frequency across the text that represent the relevance degree that required, with depending on a lexicon of a particular field(in this work we choose computer science field). This lexicon is represented using two different B+ trees one for non-keywords and the other for candidate keywords, these keywords was stored in a manner that prevent redundancy of these terms or even sub-terms to provide efficient memory usage and to minimize the search time. The proposed system was implemented using Visual Prolog 5.1 and after testing, it proved to be valuable for finding the degree of relevance between a text and its title (from point of view of accuracy and search time)

    Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things

    No full text
    Sensitive data exchanging among things over the Internet must be protected by a powerful cryptographic system. Conventional cryptographic such as advanced encryption standard (AES), and respiratory sinus arrhythmia (RSA) are not effective enough to protect internet of things (IoT) because of certain inveterate IoT properties like limited memory, computation, and bandwidth. Nowadays, chaotic maps with high sensitivity to initial conditions, strong ergodicity, and non-periodicity have been widely used in IoT security applications. So, it is suitable for IoT. Also, in a stream cipher method, the user needs to deliver the keystream to all clients in advance. Consequently, this paper proposed a method to solve the keys distribution problem based on combine both Chebyshev and logistic maps techniques as well as a master key to generate a random key. The suggested method was compared with the other stream cipher algorithms (Chacha20, RC4, Salsa20) by utilizing the same plaintext and master key as input parameters and the results were successful in the statistical national institute of standards and technology (NIST) test. Simultaneously, the suggestion was evaluated through different evaluation methods like statistical NIST test, histogram, Shannon entropy, correlation coefficient analysis, keyspace and key sensitivity, and others. All mentioned tests are passed successfully. Therefore, the suggested approach was proved it is effective in security issues

    Image Steganography Based on Chaos Function and Randomize Function

    No full text
    The exchange of data is not limited to personal text information or information about institutions and governments, but includes digital media transferred via the Internet including everything, whether texts, images or videos and audio, or animation. These media need high-security protection and high speed during its transmission from one site to another. In this study, a new method is suggested for hiding a gray-level image within a larger color image based on the proposed steganography map that merged chaotic function and randomize function. The size of the chaos and randomize functions is 16 bytes. Experimental results obtained a successful method based on mean squared error, signal-to-noise ratio, peak signal noise rate, embedding capacity, entropy, and histogram. This method can rapidly hide and extract ciphertext in and from the gray image. The original image and the stego image are difficult to distinguish because the correlation between them is very close to 1, indicating that attackers cannot easily differentiate these images with the naked eye. This condition can successfully hide information on the Internet

    Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System

    No full text
    The security strengths of block ciphers greatly rely on the confusion components which have the tendency to transform the data nonlinearly into the perplexed form. This paper proposes to put forward a novel scheme of generating cryptographically strong nonlinear confusion components of block ciphers, usually termed as substitution-boxes (S-boxes). The anticipated S-box design scheme is based on a novel five-dimensional (5-D) chaotic system analyzed in this paper. The proposed 5-D dynamical system consists of hyperchaotic phenomenon, KY dimension, conservativity, unstable equilibrium point, and complex phase attractors which are suited for cryptographic applications. The S-box based on hyperchaotic system is made to evolve in order to generate an optimized S-box for high nonlinearity score to make it robust against many linear attacks. The performance analysis of proposed S-box demonstrates that it has bijectivity, high nonlinearity; satisfied strict avalanche criterion and bits independent criterion; low differential and linear probabilities. Moreover, performance appraisal of proposed S-box justifies its better strength and features over many recently investigated S-boxes

    Image Encryption Based on Local Fractional Derivative Complex Logistic Map

    No full text
    Local fractional calculus (fractal calculus) plays a crucial role in applications, especially in computer sciences and engineering. One of these applications appears in the theory of chaos. Therefore, this paper studies the dynamics of a fractal complex logistic map and then employs this map to generate chaotic sequences for a new symmetric image encryption algorithm. Firstly, we derive the fractional complex logistic map and investigate its dynamics by determining its equilibria, geometric properties, and chaotic behavior. Secondly, the fractional chaotic sequences of the proposed map are employed to scramble and alter image pixels to increase resistance to decryption attacks. The output findings indicate that the proposed algorithm based on fractional complex logistic maps could effectively encrypt various kinds of images. Furthermore, it has better security performance than several existing algorithms

    Synchronization and different patterns in a network of diffusively coupled elegant Wang–Zhang–Bao circuits

    No full text
    Synchronization in coupled oscillators is of high importance in secure communication and information processing. Due to this reason, a significant number of studies have been performed to investigate the synchronization state in coupled circuits. Diffusive coupling is the simplest connection between the oscillators, which can be implemented through a variable resistor between two variables of two circuits. The Chua’s circuit is the most famous chaotic circuit whose dynamics have been investigated in many studies. However, Wang–Zhang–Bao (WZB) is another chaotic circuit that can exhibit exciting behaviors such as bistability. Thus, this study aims to investigate the cooperative dynamics of the WZB circuit in its elegant parameter values. To this issue, first, we explored the dynamic behavior of the elegant WZB circuit using the bifurcation diagrams, the Lyapunov exponents, and the basins of attraction. Based on the results, we found the range of the bifurcation parameter and the initial conditions wherein the system is bistable. Subsequently, setting the parameters in the monostable region, we studied the synchronization state of two diffusively coupled WZB circuits analytically and numerically. Consequently, we used master stability functions and temporally averaged synchronization error as the analytical and numerical tools to explore the synchronization state. Then we numerically examined the synchronization state in a network of 100 nonlocally coupled WZB oscillators. As a result, we found imperfect chimera and phase synchronization in the studied network before getting synchronized

    Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption

    No full text
    Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process
    corecore