Preferred Language
Articles
/
BGFXfZkBdMdGkNqjVCi3
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT decomposition via SVD coefficients extracted from DCT-transformed images in the midfrequency band. A content-aware strategy combining Gaussian blurring, Canny edge detection, and zigzag scanning is employed to increase robustness against image processing attacks. The experimental results demonstrate the effectiveness of the proposed approach, which achieves up to a 10.4% improvement in PSNR, an SSIM score of 0.996, and a 0.10% increase in NCC over those of previous methods, which mostly rely on grayscale images. These results reflect the ability of the system to maintain high visual quality while offering strong resilience and security for embedded data in full-color images.

View Publication
Publication Date
Wed May 12 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Awareness about Sun Protection among Medical Students
...Show More Authors

Background:Sun protection is one of the most important steps of skin care as it is necessary to protect the skin from ultraviolet rays that is known to cause number of harmful effects on the skin in long and frequent exposure. Objective:To assess the awareness of the medical students regarding sun exposure and its harm,study their sun protection attitudes,practices, their use of sunscreens, and to know if they can share information to other people to encourage such important protective methods and behaviours which are not well established in our community.Patients and method:This cross-sectional descriptive study included 300 students both females and males of fourth and fifth grade of College of Medicine in university of Baghdad.Results:M

... Show More
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Proceeding Of The 1st International Conference On Advanced Research In Pure And Applied Science (icarpas2021): Third Annual Conference Of Al-muthanna University/college Of Science
Climate change and its effect on water and vegetation cover over shary region using GIS techniques
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 22 2025
Journal Name
Full Text Book Of Xv. International Scientific Congress Of Pure, Applied And Technological Sciences
Full Text Book of Minar Congress15
...Show More Authors

One of the crucial public health problems worldwide is the urinary tract infections (UTIs) that are derived from uropathogenic bacteria (UPBs). Slime layer is known to have the ability to permit bacteria to achieve smooth surfaces attachment like catheters and prosthetic implants which in turn, facilitate biofilm formation and may cause lethal infections. On the other hand, Extended-spectrum beta-lactamase (ESBL) production is considered a growing concern among UPBs due to the limiting of the treatment options and contributes to resistance toward antibiotics. The principal study's point is the finding out the slime layer and ESBL production in Escherichia coli and Klebsiella pneumoniae of uropathogenic origin. Ten ready isolates (five isola

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
The Concept of the Text, its Divisions, Connotations, and Methodology
...Show More Authors

The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 22 2025
Journal Name
Frontiers In Political Science
The role of identity in a multilevel interdependence in international relations: exploring popular understandings of international politics
...Show More Authors

This study investigates the role of identity as a critical factor in mediating the relationship between local and regional politics within the broader context of international relations (IR). While identity is frequently acknowledged as a catalyst for political instability and conflict, its function in fostering interdependence across political levels remains underexplored, particularly through empirical research. To address this gap, the study adopts a quantitative methodology, drawing on theories of identity politics and interdependence. A structured survey was administered to assess public perceptions of identity's influence on international engagement and its bridging role between domestic and regional political dynamics. The fi

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jan 12 2023
Journal Name
Journal Of The Saudi Society Of Agricultural Sciences
Effect of planting density, foliar spraying and overlapping system on the growth and productivity using soilless culture system
...Show More Authors

Scopus (5)
Scopus