Preferred Language
Articles
/
6xZFuIcBVTCNdQwCnF7_
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method can be considered a success and can be adopted in the field of steganography

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (11)
Scopus
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iraqi Journal Of Physics
Studying the Correlation Between Supermassive Black Holes and Star Formation Rate for Samples of Seyfert Galaxies (Type 1 and 2)
...Show More Authors

An optical spectroscopic study is reported in this article to study the correlation between the supermassive black hole (SMBH) and the star formation rate (SFR) for a sample of Seyfert galaxies type (I and II). The study focused on 45 galaxy of Seyfert 1, in addition to 45 galaxy of Seyfert 2, where these samples have been selected form different survey of Salon Digital Sky Survey (SDSS). The redshift (z) of these objects were between (0.02 – 0.26). The results of Seyfert 1 galaxies shows that there good correlation between the SMBH and the SFR depending on statistical analysis parameter named Spearman’s Rank Correlation in a factor of (ρ=0.609), as well as the Seyfert 2 galaxies results show a good correlation between the SMBH

... Show More
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iraqi Journal Of Physics
Studying the Correlation Between Supermassive Black Holes and Star Formation Rate for Samples of Seyfert Galaxies (Type 1 and 2)
...Show More Authors

An optical spectroscopic study is reported in this article to study the correlation between the supermassive black hole (SMBH) and the star formation rate (SFR) for a sample of Seyfert galaxies type (I and II). The study focused on 45 galaxy of Seyfert 1, in addition to 45 galaxy of Seyfert 2, where these samples have been selected form different survey of Salon Digital Sky Survey (SDSS). The redshift (z) of these objects were between (0.02 – 0.26). The results of Seyfert 1 galaxies shows that there good correlation between the SMBH and the SFR depending on statistical analysis parameter named Spearman’s Rank Correlation in a factor of (ρ=0.609), as well as the Seyfert 2 galaxies results show a good correlation between the SMBH and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Mustansiriyah Journal Of Arts
The Significance of Utilizing the Social Networking Site (LinkedIn) Among Researchers and Specialists in the Field of Information and Knowledge Technologies
...Show More Authors

This study aims to identify both the importance of using (LinkedIn) and its drawbacks for researchers and specialists in the field of information and knowledge technologies. The study relied mainly on the statistical method (analytical method) from the collection of data tools (questionnaire) that was distributed electronically (Google Forms) to the sample community of (55) instructors. The feedback received illustrates that (46) instructors among those who participated in the questionnaire subscribed to (LinkedIn) and the rest did not. Their data was analyzed statistically, and the general arithmetic mean and the hypothetical mean was extracted for them to achieve the objectives of the study and prove their hypotheses. The site positively

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
The Effects of Inclination and Compounds Angles of Round Holes in Staggered Rows on Adiabatic Film Cooling Effectiveness of Vane Suction side
...Show More Authors

The aim of this work is oriented to increase film cooling effectiveness value through numerical investigations for flow of Mach number not more than 0.3 around vane surface, to find the effects of inclination and compounds angles of round holes in staggered rows on adiabatic film cooling effectiveness of vane suction side. Multi cylindrical film cooling hole cases were studied with pitch ratio P/d =2 and 3, local blowing ratios M=0.382, 0.77 and 1.14,  inclination angles a=30° and 45°, compound angles β= 0°, 15°, 30° and 45° and local momentum ratios I= 0.084, 0.34 and 0.756  for better cooling process.

            A numerica

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Extrapolating working names verb act in the Koran in the books of Iraqi researchers and their theses from 1968-2000 m: (Collection and descriptive study)
...Show More Authors

This research deals with an important grammatical section of the Qur'anic grammar, which is the working names the work of acts in the Quranic grammar in the studies of Iraqi researchers from 1968 to 200 AD.
    The study of working names working verb in the Koran of the important studies, especially among Iraqi researchers, the Iraqi researcher has presented detailed studies related to working names particles action verb in the Koran, and my research is studying this important grammatical section of the Koranic grammar, which is the working names working verb in The Holy Quran in the books of Iraqi researchers and their theses from 1968-2000. I studied in the preface working names of the act, and what the Iraqi res

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 05 2018
Journal Name
International Journal Of Science And Research (ijsr)
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication