Preferred Language
Articles
/
6xZFuIcBVTCNdQwCnF7_
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method can be considered a success and can be adopted in the field of steganography

Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Extrapolating working names verb act in the Koran in the books of Iraqi researchers and their theses from 1968-2000 m: (Collection and descriptive study)
...Show More Authors

This research deals with an important grammatical section of the Qur'anic grammar, which is the working names the work of acts in the Quranic grammar in the studies of Iraqi researchers from 1968 to 200 AD.
    The study of working names working verb in the Koran of the important studies, especially among Iraqi researchers, the Iraqi researcher has presented detailed studies related to working names particles action verb in the Koran, and my research is studying this important grammatical section of the Koranic grammar, which is the working names working verb in The Holy Quran in the books of Iraqi researchers and their theses from 1968-2000. I studied in the preface working names of the act, and what the Iraqi res

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iraqi Journal Of Physics
Studying the Correlation Between Supermassive Black Holes and Star Formation Rate for Samples of Seyfert Galaxies (Type 1 and 2)
...Show More Authors

An optical spectroscopic study is reported in this article to study the correlation between the supermassive black hole (SMBH) and the star formation rate (SFR) for a sample of Seyfert galaxies type (I and II). The study focused on 45 galaxy of Seyfert 1, in addition to 45 galaxy of Seyfert 2, where these samples have been selected form different survey of Salon Digital Sky Survey (SDSS). The redshift (z) of these objects were between (0.02 – 0.26). The results of Seyfert 1 galaxies shows that there good correlation between the SMBH and the SFR depending on statistical analysis parameter named Spearman’s Rank Correlation in a factor of (ρ=0.609), as well as the Seyfert 2 galaxies results show a good correlation between the SMBH

... Show More
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iraqi Journal Of Physics
Studying the Correlation Between Supermassive Black Holes and Star Formation Rate for Samples of Seyfert Galaxies (Type 1 and 2)
...Show More Authors

An optical spectroscopic study is reported in this article to study the correlation between the supermassive black hole (SMBH) and the star formation rate (SFR) for a sample of Seyfert galaxies type (I and II). The study focused on 45 galaxy of Seyfert 1, in addition to 45 galaxy of Seyfert 2, where these samples have been selected form different survey of Salon Digital Sky Survey (SDSS). The redshift (z) of these objects were between (0.02 – 0.26). The results of Seyfert 1 galaxies shows that there good correlation between the SMBH and the SFR depending on statistical analysis parameter named Spearman’s Rank Correlation in a factor of (ρ=0.609), as well as the Seyfert 2 galaxies results show a good correlation between the SMBH and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Fri Jan 05 2018
Journal Name
International Journal Of Science And Research (ijsr)
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
The Effects of Inclination and Compounds Angles of Round Holes in Staggered Rows on Adiabatic Film Cooling Effectiveness of Vane Suction side
...Show More Authors

The aim of this work is oriented to increase film cooling effectiveness value through numerical investigations for flow of Mach number not more than 0.3 around vane surface, to find the effects of inclination and compounds angles of round holes in staggered rows on adiabatic film cooling effectiveness of vane suction side. Multi cylindrical film cooling hole cases were studied with pitch ratio P/d =2 and 3, local blowing ratios M=0.382, 0.77 and 1.14,  inclination angles a=30° and 45°, compound angles β= 0°, 15°, 30° and 45° and local momentum ratios I= 0.084, 0.34 and 0.756  for better cooling process.

            A numerica

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 02 2025
Journal Name
Karbala Journal Of Physical Education Sciences
Analytical Study Of Some Biomechanical Variables For Progress Phase Their Relationship To The Level Of High Player Weight Position When Performing Background Acrobatic Movements In Artistic Gymnastics Researchers
...Show More Authors

View Publication
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication