Preferred Language
Articles
/
DRYMBYcBVTCNdQwCRi7H
A steganography based on orthogonal moments
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Isesco Journal Of Science And Technology
Effect of Solvents on the Dipole Moments and Fluorescence Quantum Yield of Rhodamine Dyes
...Show More Authors

Abstract: This study aims to investigate the effects of solvents of various polarities on the electronic absorption and fluorescence spectra of RhB and Rh6G. The singlet‐state excited dipole moments (me) and ground state dipole moments (mg) were estimated from the equations of Bakshiev -Kawski and Chamma‐ Viallet using the variation of Stokes shift along with the solvent’s dielectric constant (e) and refractive indexes (n). The observed singlet‐state excited dipole moments were found to be larger than the ground‐state ones. Moreover, the obtained fluorescence quantum yield values were influenced by the environment of the fluorescing molecule. Consequently, the concentration of the dye solution, excited singlet state absorption and

... Show More
Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Mon May 01 2017
Journal Name
Applied Mathematics And Computation
Reconstruction of time-dependent coefficients from heat moments
...Show More Authors

View Publication
Scopus (31)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Engineering And Technology Journal
Face Retrieval Using Image Moments and Genetic Algorithm
...Show More Authors

Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Orthogonal Functions Solving Linear functional Differential EquationsUsing Chebyshev Polynomial
...Show More Authors

A method for Approximated evaluation of linear functional differential equations is described. where a function approximation as a linear combination of a set of orthogonal basis functions which are chebyshev functions .The coefficients of the approximation are determined by (least square and Galerkin’s) methods. The property of chebyshev polynomials leads to good results , which are demonstrated with examples.

View Publication Preview PDF
Crossref (4)
Crossref