Preferred Language
Articles
/
JhilcpUBVTCNdQwCTi6Y
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating the Efficiency of the Municipal Sector in Anbar Governorate, using the Non-Parametric Approach (DEA).
...Show More Authors

 

The research aims to measure, assess and evaluate the efficiency of the directorates of Anbar Municipalities by using the Data Envelopment Analysis method (DEA). This is because the municipality sector is consider an important sector and has a direct contact with the citizen’s life. Provides essential services to citizens. The researcher used a case study method, and the sources of information collection based on data were monthly reports, the research population is represented by the Directorate of Anbar Municipalities, and the research sample consists of 7 municipalities which are different in terms of category and size of different types. The most important conclusion reached by the research i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Pertanika Journal Of Science & Technology
Modified Kohonen network algorithm for selection of the initial centres of Gustafson-Kessel algorithm in credit scoring
...Show More Authors

Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res

... Show More
Scopus (9)
Scopus
Publication Date
Mon Nov 25 2019
Journal Name
Alustath Journal For Human And Social Sciences
Barbara Kingsolver: Evaluating Her Contribution to the Eco-Feminist Novel
...Show More Authors

Climate change, together with terrorism, economic depressions, and mass-destructive weaponry, is a source of international phobia for many people. The advancement in technology increases the competition among world powers and economic systems to develop their industrial enterprises. The smoke that emits from the factories, the pollution caused by the industrial projects, the excessive use of green gas result in the increase of global warming and have catastrophic effects on the ecosphere of the planet. Besides, man’s wrong practices even in agricultural matters are exhausting the natural resources of the lands, and they badly affect the ecological diversity and the wellbeing of the humans and non-humans alike. Contemporary feminis

... Show More
Crossref (1)
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Evaluating the Crop Coefficient for Cherries Plants in Michigan State
...Show More Authors

Crop coefficient for cherries was evaluated by measure the water consumption in Michigan State to find its variation with time as the plant growth. Crop coefficients value (Kc) for cherries were predicated by Michigan State University (MSU) and also by Food and Agriculture Organization (FAO) according to consume of water through the season. In this paper crop coefficients for cherries are modified accordingly to the actual measurements of soil moisture content. Actual evapotranspiration (consumptive use) were measured by the soil moisture readings using Time Domain Reflectometers (TDR), and compared with the actual potential evapotranspiration that calculated by using modified Penman-Monteith equation which depends on metrological statio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Evaluating the Uses of Concrete Demolishing Waste in improving the Geotechnical Properties of Expansive Soil
...Show More Authors

Expansive soil is one of the most serious problems that face engineers during the execution of any infrastructure projects. Soil stabilization using chemical admixture is one of the most traditional and widespread methods of soil improvement. Nevertheless, soil improvement on site is one of the most economical solutions for many engineering applications. Using construction and demolishing waste in soil stabilization is still under research., The aim of this study is to identify the effect of using concrete demolishing waste (CDW) in soil stabilization. Serious tests were conducted to investigate the changes in the geotechnical properties of the natural soil stabilized with CDW. From the results, it is concluded that the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design an Algorithm to Calculate the Inverse Permutations Of the Symmetric Group Sn In Computer
...Show More Authors

  The search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.

View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The artistic image of flowers in the poetry of Abi Waki` al-Tanisi
...Show More Authors

 

Man was closely associated with nature in its various forms, as it represented the incubator for him in all areas of his life, so writers often made it a material for their literature and a fertile ground for their productions, so it appeared in its various forms and man’s need for it, its good and its bad in literature throughout history, and the Arabs are like Other nations, since the pre-Islamic era, nature was an important outlet and a refuge for poets in the production and creativity of literature and to this day, and when we talk about a poet from the Fatimid state, we find that nature - especially spring and its flowers - in that period took its take from literature and represented a phenomenon for many Among the

... Show More
View Publication Preview PDF