Preferred Language
Articles
/
ExZSgYcBVTCNdQwCWlTv
Enhancing LSB algorithm against brute-force attack using ASCII mapping technique
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Steganography Technique using Genetic Algorithm
...Show More Authors

Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Publication Date
Tue Nov 02 2021
Journal Name
Iraqi Journal Of Science
Mapping Land Cover/Land Use for Change Derivation Using Remote Sensing and GIS Technique
...Show More Authors

    Deriving land cover information from satellite data is one of the most common applications employed to monitor, evaluate, and manage the environment. This study aims to detect the land cover/land use changes and calculate the areas of different land cover types in Baghdad, Iraq, for the period from 2015 to 2020, using Landsat 8 images. The supervised Maximum Likelihood Classification (MLC) method was applied to classify the images. Four land cover types were obtained, namely urban, vegetation, water, and barren soil.  Changes in the four land cover classes during the study period were observed. The extent of the urban, vegetation, and water areas was increased by about 7.5%, 9.5%, and 1.5%, respectively, whereas t

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Analysis the Surface Morphology of the Porous Media by using Atomic Force Microscope technique
...Show More Authors

An atomic force microscope (AFM) technique is utilized to investigate the polystyrene (PS) impact upon the morphological properties of the outer as well as inner surface of poly vinyl chloride (PVC) porous fibers. Noticeable a new shape of the nodules at the outer and inner surfaces, namely "Crater nodules", has been observed. The fibers surface images have seen to be regular nodular texture at the skin of the inner and outer surfaces at low PS content. At PS content of 6 wt.%, the nodules structure was varied from Crater shape to stripe. While with increasing of PS content, the pore density reduces as a result of increasing the size of the pore at the fiber surface. Moreover, the test of 3D-AFM images shows that the roughness of both su

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 24 2021
Journal Name
Iraqi Journal Of Science
A proposal of Multimedia Steganography Algorithm based on Improved Least Significant Bit (LSB) Method
...Show More Authors

Because of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding text file with related image in gray-scale image. As well as we discuss the bit plane which is divided into eight different images when combination them we get the actual image. The findings of the research was the stego-image is indistinguishable to the naked eye from the original cover image when the value of bit less than four Thus we get to the goal is to cover up the existence of a connection or hidden data. The Peak to Signal Noise Ratio(PSNR) and Mean Square Error (

... Show More
View Publication Preview PDF
Crossref