Preferred Language
Articles
/
F_rBsJkBMF18lwyZlM0M
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorithm for this research can be divided into two main parts: hidingthe text of the sender, and extracting it by the receiver. Moreover, part can be divided into manyprocedures done by the program Delphi 5. (PDF) A Proposed Technique for Information Hiding Based on DCT.. Available from: https://www.researchgate.net/publication/220419501_A_Proposed_Technique_for_Information_Hiding_Based_on_DCT [accessed Oct 04 2025].

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jan 06 2026
Journal Name
Al–bahith Al–a'alami
US Policy Image Regarding the Middle East Region as Reported by the Iraqi Newspapers (An Analytical Study of the Public Opinion in Editorials: Al-Sabah, Al-Mashriq and Tariq Al-Shaab Papers Over the Period from 1st of July to 30th of September 2013)
...Show More Authors

The present study is an attempt to throw light on the nature of the US policy regarding the Middle East region as portrayed by AI-Sabah, Al-Mashriq and Tariq Al-Shaab papers over a period of three months from 1st of July to 30th of September 2013.

In writing this study, a number of goals have been set by the researcher. These goals may include but in no way limited to the nature of the US image as carried by the above three papers, the nature of the topics tackled by them and the nature of the Arab countries which received more and extensive coverage than others.

A qualitative research approach is proposed for the study. This approach has allowed the researcher to arrive at definite answers for the possible questions rais

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Image Compression Using Tap 9/7 Wavelet Transform and Quadtree Coding Scheme
...Show More Authors

This paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Scale-Invariant Feature Transform Algorithm with Fast Approximate Nearest Neighbor
...Show More Authors

There is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sat Apr 20 2024
Journal Name
Baghdad Science Journal
طريقة مقترحة لتغيير حجم الصورة باستخدام منحني Bezier
...Show More Authors

عملية تغيير حجم الصورة في مجال معالجة الصور باستخدام التحويلات الهندسية بدون تغيير دقة الصورة تعرف ب image scaling  او image resizing. عملية تغيير حجم الصورة لها تطبيقات واسعة في مجال الحاسوب والهاتف النقال والاجهزة الالكترونية الاخرى. يقترح هذا البحث طريقة لتغيير حجم الصورة باستخدام المعادلات الخاصة بمنحني Bezier وكيفية الحصول على افضل نتائج. تم استخدام Bezier curve في اعمال سابقة في مجالات مختلفة ولكن في هذا البحث تم استخد

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Stereotypical Frames if the Image of Women in the Iraqi TV Drama after 2003
...Show More Authors

This study aims to deliver the woman’s image and to unveil on how to be introduced in the TV series. The research is based on the survey method-using content analysis tool. The research sample represented in the TV series produced by the IMN, which were displayed in 2014 and used the pattern of Margaret Gallagher to analyze the content of the series in accordance with the frame analysis theory.
The study came up with declination of the woman’s representation compared with man in Iraqi TV drama, also the study finds that the series introduced the woman according to the personal, social, political, and economic frames in a standardizing method. It focuses on the characteristics always attributed to it as showing her obedient of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
The Dialectic of the Living Body (the actor) and the Dead Body (the Sinography Item) in the Construction of the Staged Image of the Play: جاسم كاظم عبد - عماد هادي عباس
...Show More Authors

The current research deals with the dialectical relationship resulting from the conflict in the violent combination and construction of the living ( the actor)and the dead (the item) in the structure of the Sinography construction and the emergence of the theatrical play space , which can be summed up by the following question: what is the nature of the dialectical relationship between the living (the actor) and the dead( the item) in the Sinography creation, which limited the research in a central objective : to identify the controversy of the living (actor) and the dead (item) in the performance unit of the theatrical scene . The research, in its objective limits set forth in its methodological framework, analyzes this controversy in o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 06 2026
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Economics And Finance Studies
THE ROLE OF EXTERNAL INDEBTEDNESS OF THE ECONOMIC AND FINANCIAL DEVELOPMENT IN IRAQ
...Show More Authors

The imperative of achieving financial stability has transcended national boundaries, necessitating heightened attention from both researchers and policymakers. Consequently, this article delves into an examination of the impact of government debt and public debt on financial development within the context of Iraq. The study employs monetary policy, interest rate, inflation, and population growth as control variables to prognosticate financial development. Utilizing data extracted from the World Development Indicators (WDI) spanning the period from 1995 to 2022, the study employs the dynamic autoregressive distributed lag (DARDL) approach to scrutinize the associations under investigation. The findings underscore a negative association betwe

... Show More
Preview PDF
Scopus