Preferred Language
Articles
/
1xYUS4wBVTCNdQwCsvpv
The secret of Repentance and Confession in Christianity
...Show More Authors

The reason for studying (The secret of Repentance and Confession in Christianity) goes back to the deep roots of repentance in all religions, specially the three revealed religions, and those who adhere to them. The human psych by nature is incessantly demanding sins and the wrong deeds. It is in need of repentance which God has opened for them. Almighty God is happy when his creatures repent and refrain from sinning. This is the reason for success in life and the hereafter and the principle of the happiness. It is also a condition for the good course. Therefore, man should refrain from sinning and feel regret for committing sins forever.

Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 02 2020
Journal Name
جامعة بغداد
طقوس الديانة الايزيديــة
...Show More Authors

لما كان الغموض يلفُّ حياة وتاريخ هذه الطائفة الايزيديــــــة ، لاسيما القديم منه ، إذ أنهم يعتمدون التاريخ الشفاهي أو علم الصدور ، وفضلاً عن هذا أنهم ديانة مغلقة ، فقد ارتأى الباحث أن يكتب عن جزئية أو مفردة من تاريخ وديانة هؤلاء القوم ، والتي كما يعتقدـ تكون أكثر دلالة في إعطاء تصور عن حياة الايزيدية وديانتهم ، وقد وسمي البحث بالعنوان الآتي : " طقوس الديانة الايزيدية " حيث تناول الباحث الموضوع من خلال ثلاثة مباح

... Show More
Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
The Sacrament of Baptism among Christian Denominations Descriptive Study
...Show More Authors

Christianity has rituals and rituals to be carried out, and can not be abandoned, and they see that the sacred statutes ordered by Christ () his followers, including: (the mystery of baptism between Christian denominations, descriptive study) A Christian is to be baptized as the seal of faith, as evidenced by the Bible in the words of Jesus to His disciples.
Baptism takes place in the name of the Father, the Son, and the Holy Spirit. This makes them Christian through the practice of this obligatory man enters the Church, represented by the death, burial, and resurrection of Christ according to their belief. And every person who has received the sacrament of baptism remains a Christian until death, in the light of what they see.

View Publication Preview PDF
Publication Date
Thu Jun 30 2016
Journal Name
جامعة بغداد
العبادات في الديانة البوذية والديانات السماوية الثلاث
...Show More Authors

جاء الكتاب في اربع فصول تناول الفصل التمهيدي نظرة عامة حول تعريف الدين والعبادة والديانة البوذية والفصل الأول تناول الصلاة في الديانة البوذية والديانات السماوية الثلاث وتناول الفصل الثاني الزكاة في الديانة البوذية والديانات السماوية الثلاث وتناول الفصل الثالث الصيام في الديانة البوذية والديانات السماوية الثلاث وتناول الفصل الرابع الحج في الديانة البوذية والديانات السماوية الثلاث وختم البحث بقائمة

... Show More
Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)
...Show More Authors

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 10 2020
Journal Name
Journal Of Legal Sciences
The Effect of Fatcas Act On Banks Obligation to Keep Clients Banking Secret in Iraq
...Show More Authors

Tax compliance is one of the most important programs that countries seek to combat a tax evasion. the congress of u.s. enactrd an act which guarantes the us: government fighting against tax evasion of those citizens who lives outside its territory. this act is called: (the foreign account tax compiliance act), FATCA 2013. the idea of this law is embodied in commitment of all non – us foreign financial institutions and bank sin in countries that have memorand am of mutel cooperation with the U.S government to diselose their records for internal revenue service and to report in formation about accounts by u.s. account holders so that (IRS) can with hold on pay ments to certiav investors according to the u.s. legal rules .

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Steganography Encryption Secret Message in Video Raster Using DNA and Chaotic Map
...Show More Authors

       Recently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref