Preferred Language
Articles
/
JxbtIIgBVTCNdQwCaXTN
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Thu Nov 03 2022
Journal Name
Res Militaris
Prose of Sons of Imam Ali Al-Rida (Peace Be Upon Them): A Study Regarding the Structure of the Image and Its Implications - Simile as a Model
...Show More Authors

Praise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his pure God and his faithful companions. The Islamic heritage was replete with texts issued from among the pure infallibility, which constituted a prominent teacher that takes the student to stop there in search of its goals, purposes and beauty. The choice was made from those texts that were issued by the imams of Muslims in the Abbasid era, namely Imam Muhammad al-Jawad, his son Imam Ali al-Hadi and his grandson Imam Hassan Zaki al-Askari. (Peace be upon them), and scholars have called them (sons of satisfaction), and researchers have shed light on these texts from rhetorical, artistic

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Advanced Research In Computer And Communication Engineering
Information hiding by using Developed M8PAM Technique
...Show More Authors

Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation Optimal Threshold Value for Image Edge Detection
...Show More Authors

      A new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
The general requirement and the disagreement of the fundamentalists in it
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

In this research, I will deal with the significance of the imperative and the disagreement of the fundamentalists in the general requirement by dividing it into an introduction and two sections. , and the appropriate indication.

View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the Performance of IT Governance According to COBIT5 Framework by Using the Balanced Scorecard
...Show More Authors

The research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.

The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
The Chicago School in Urban Sociology: A Socio-Historical Approach on the Pragmatic Thought Influence as a Theoretical Frame of Reference in it-1892-2020
...Show More Authors

The present theoretical study analyzes the legacy of the Chicago School of Urban Sociology and evaluates it in the light of the growth and development of Chicago City and the establishment of sociology in it. Sociology has become an academic discipline recognized in the United States of America in the late nineteenth century, particularly, after the establishment of the first department of sociology in the University of Chicago in 1892. That was during the period of the rapid industrialization and sustainable growth of the Chicago City. The Chicago School relied on Chicago City in particular, as one of the American cities that grew and expanded rapidly in the first two decades of the twentieth century. At the end of the nineteenth centur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ELEMENTS OF MARKETING MIX AND THEIR ROLE IN CONSUMER PERCEPTION OF BRAND IMAGE: A SURVEY OF SAMPLE OPINIONS FROM CONSUMERS OF ENIEM BRAND IN THE ALGERIAN MARKET.: ELEMENTS OF MARKETING MIX AND THEIR ROLE IN CONSUMER PERCEPTION OF BRAND IMAGE: A SURVEY OF SAMPLE OPINIONS FROM CONSUMERS OF ENIEM BRAND IN THE ALGERIAN MARKET.
...Show More Authors

The current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o

... Show More
View Publication Preview PDF