Preferred Language
Articles
/
JhilcpUBVTCNdQwCTi6Y
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Using GIS Technique for evaluating water quality of Abu Zarag marsh during the flood season
...Show More Authors
Abstract<p>This research deals with the most important heritage in Iraq, which are the Iraqi marshes, especially Abu Zarag marsh in Al-Nasiriyah city south of Iraq. The research is divided into two parts. The first part deals with evaluating the water quality parameters of Abu Zarag marsh for the period from December 2018 to April 2019 which is the flooding season. The parameters are Temperature, pH, Electrical Conductivity, Total Dissolved Solids, Alkalinity, Total Hardness, Turbidity, Dissolved Oxygen, Sulfate, Nitrate. The second part is a comparison between the water quality parameters during the recent period with the same period during the previous years from 2014 to 2019. The results are </p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Nov 25 2022
Journal Name
Baghdad Science Journal
Evaluating the Activity of Ultrasound on Biofilm Formation by Acinetobacter baumannii isolated from clinical Specimens
...Show More Authors

Acinetobacter baumannii received attention for its multi-drug resistant associated with many severe infections and outbreaks in clinical environment. The aims of the study are to investigate the antibiotic susceptibility profile of clinically isolated A. baumannii, biofilm production, and the efficiency of Low Frequency Ultrasound (LFU) and honey to attenuate biofilm production. A total of 100 samples were taken from different sources from Baghdad hospitals. The susceptibility patterns revealed the percentage of pan drug resistant (PDR) isolates were 1.5 %, 72.7 % were extended drug resistant (XDR), 16.7 % were multidrug resistant (MDR), and 9.1 % were non MDR and sensitive to most antibiotics used. The ability to form

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 11 2022
Journal Name
Journal Of The College Of Basic Education
Breaking the Stereotype Image of Women in Caryl Churchill’s Top Girls
...Show More Authors

تحلل الورقة الحالية تمثيل كاريل تشرشل للصورة النمطية للمرأة في Top Girls (1982). تُظهر المسرحية كيف وصلت النساء في نضالهن لمحاربة اضطهاد الرجال عبر التاريخ ، إلى مستوى من القوة والحرية يستخدمان للسيطرة على جنسهن دون شفقة. مارلين ، الشخصية المركزية في هذه المسرحية ، هي امرأة تبنت الصفات الذكورية إلى أقصى الحدود. لتسلق سلم النجاح إلى قمته ، تضحي مارلين بطفلها وعائلتها وحبها. كما تعرض المسرحية النساء الصامتات والم

... Show More
View Publication
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Nasaq Journal
The Demonic Image of Autoimmunity in Dan Brown's Angels and Demons
...Show More Authors

Autoimmunity is a philosophical term that enhances the fields of life-sciences, and links out to the unnatural behaviour of an individual. It is caused by the defenses of an organism that deceive its own tissues. Obviously, the immune system should protect the body against invading cells with types of white blood cells called antibodies. Nevertheless, when an autoimmune disease attacks, it causes perilous actions like suicide. Psychologically, Jacques Derrida (1930-2004) calls autoimmunity a double suicide, because it harms the self and the other. In this case, the organ disarms betraying cells, as the immune system cannot provide protection. From a literary perspective, Derrida has called autoimmunity as deconstruction for over forty years

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
Biomedical And Pharmacology Journal
Phytochemical Comparison Study for Evaluating the Hypolipidemic Effect Between Two Iraqi Pepper Spp in the Rats Model.
...Show More Authors

Hypercholesterolemia is a predominant risk factor for atherosclerosis and cardiovascular disease (CVD). The World Health Organization (WHO), ) recommended reducing the intake of cholesterol and saturated fats. On the other hand, limited evidence is available on the benefits of vegetables in the diet to reduce these risk factors, so this research was conducted to compare the hypolipidemic effect between the extracts of two different types of Iraqi peppers, the fruit of the genus Capsicum traditionally known as red pepper extract (RPE), and Piper nigrum as black pepper extract (BPE), respectively, in different parameters and histology of the liver of the experimental animals. The red pepper was extracted by ethyl acetate, while the black pepp

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
The preoccupation of mental image in the designs of internal spaces (cinema) is a model
...Show More Authors

The design studies, especially in their contemporary stages, have not been isolated from the subjects that underpin advanced ideas in the field of technical treatments that enrich and improve the social life of users through those technological innovations that have enhanced and changed life styles, Especially in the field of general institutional techniques, including cinemas, as the ideal places for people and visitors to this space, which can contribute to the promotion of cultural, social and technical aspects within this millennium. DONC as reflected on the positive communication and communication between the intellectual and cognitive develop individuals, including cultural and technical side of the individual. The first chapter co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials &amp; Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (20)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Estimate missing value by use analyses of covariance method for split block-design
...Show More Authors

The research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in

... Show More
View Publication Preview PDF
Crossref