Preferred Language
Articles
/
FhZFu4sBVTCNdQwCN9mx
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Fri Sep 01 2017
Journal Name
International Journal Of Engineering Research And Advanced Technology
. Medical Image Compression using Hybrid Technique of Wavelet Transformation and Seed Selective Predictive Method
...Show More Authors

Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On The Double Integral Transform (Complex EE Transform) and Their Properties and Applications
...Show More Authors

Due to the importance of solutions of partial differential equations, linear, nonlinear, homogeneous, and non-homogeneous, in important life applications, including engineering applications, physics and astronomy, medical sciences, and life technology, and their importance in solutions to heat transfer equations, wave, Laplace equation, telegraph, etc. In this paper, a new double integral transform has been proposed.

In this work, we have introduced a new double transform ( Double Complex EE Transform ). In addition, we presented the convolution theorem and proved the properties of the proposed transform, which has an effective and useful role in dealing with the solution of two-dimensional partial differential equations. Moreover

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Thu Aug 08 2019
Journal Name
Political Sciences Journal
The Neo-Conservative and call for the dominance of US military power globally
...Show More Authors

Abstrct

The administrations of Presidents Clinton and Bush Jr. have seen the emergence of neoconservatives. The neoconservative were the establishment of the Project for the New American Century (PNAC) project in 1997 during the Clinton administration. The neoconservatives, through the New Century Project, were able to make important foreign policy decisions, notably the Iraq Liberation Law, which was passed by Congress on January 26, 1998 and signed by President Clinton and became a law legitimized. Clinton became authorized to take whatever measures he saw fit to contribute to regime change in Iraq. The Bush administration has also undergone major and significant shifts in US strategy on US foreign policy. During the Bush admin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Gray-Scale Image Compression Method Based on a Pixel-Based Adaptive Technique
...Show More Authors

     Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Apr 11 2022
Journal Name
Iraqi Journal Of Science
International Journal on Technical and Physical Problems of Engineering
...Show More Authors

International Journal on Technical and Physical Problems of Engineering

Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (10)
Crossref