Preferred Language
Articles
/
BxYMBYcBVTCNdQwCBy4r
Shot boundary detection based on orthogonal polynomial
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (12)
Scopus Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 02 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability
Effect of thickness variation CdO/PSi thin films on detection of radiation
...Show More Authors

CdO films were deposited on substrates from glass, Silicon and Porous silicon by thermal chemical spray pyrolysis technique with different thicknesses (130 and 438.46) nm. Measurements of X-ray diffraction of CdO thin film proved that the structure of the Polycrystalline is cubic lattice, and its crystallite size is located within nano scale range where the perfect orientation is (200). The results show that the surface’s roughness and the root mean square increased with increasing the thickness of prepared films. The UV-Visible measurements show that the CdO films with different thicknesses possess an allowed direct transition with band gap (4) eV. AFM measurement revealed that the silicon porosity located in nano range. Cadmium oxide f

... Show More
Scopus (2)
Scopus
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Surface enhanced Raman spectroscopy based sensitive and specific detection of vitamin D3, glycated hemoglobin, and serum lipid profile of breast cancer patients
...Show More Authors

Considering the expanding frequency of breast cancer and high incidence of vitamin D3 [25(OH)D3] insufficiently, this investigate pointed to explain a relation between serum [25(OH)D3] (the sunshine vitamin) level and breast cancer hazard. The current study aimed to see how serum levels of each [25(OH)D3], HbA1c%, total cholesterol (TC), high density lipoprotein cholesterol (HDL-C), low density lipoprotein cholesterol (LDL-C), and triglyceride (TG) were affected a woman’s risk of getting breast cancer. In 40 healthy volunteers and 69 untreated breast cancer patients with clinical and histological evidence which include outpatients and hospitalized admissions patients at the Oncology Center, Medical City / Baghdad - Iraq. Venous blood samp

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Buckling and Pre Stressed Dynamics Analysis of Laminated Composite Plate with Different Boundary Conditions
...Show More Authors

Critical buckling and natural frequencies behavior of laminated composite thin plates subjected to in-plane uniform load is obtained using classical laminated plate theory (CLPT). Analytical investigation is presented using Ritz- method for eigenvalue problems of buckling load solutions for laminated symmetric and anti-symmetric, angle and cross ply composite plate with different elastic supports along its edges. Equation of motion of the plate was derived using principle of virtual work and solved using modified Fourier displacement function that satisfies general edge conditions. Various numerical investigation were studied to exhibit a convergence and accuracy of the present solution for considering some design parameters such as edge

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Optimal Classical Continuous Control Quaternary Vector of Quaternary Nonlinear Hyperbolic Boundary Value Problem
...Show More Authors

This work is concerned with studying the optimal classical continuous control quaternary vector problem. It is consisted of; the quaternary nonlinear hyperbolic boundary value problem and the cost functional. At first, the weak form of the quaternary nonlinear hyperbolic boundary value problem is obtained. Then under suitable hypotheses, the existence theorem of a unique state quaternary vector solution for the weak form where the classical continuous control quaternary vector is considered known is stated and demonstrated by employing the method of Galerkin and the compactness theorem. In addition, the continuity operator between the state quaternary vector solution of the weak form and the corresponding classical continuous control qua

... Show More
View Publication Preview PDF
Crossref