Preferred Language
Articles
/
PRdyXo8BVTCNdQwCVHTq
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.

Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Trials of linguistic restoration
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Some Thoughts on Greetings in English and Arabic
...Show More Authors

The present study examines the main points of differences in the subject of greetings between the English language and the Arabic language. From the review of the related literature on greetings in both languages, it is found that Arabic greeting formulas are more elaborate than the English greetings, because of the differences in the social customs and the Arabic traditions and the Arabic culture. It is also found that Arabic greetings carry a religious meaning basing on the Islamic principle of “the same or more so”, which might lead to untranslatable loopholes when rendered in English.

View Publication Preview PDF
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Design of an Efficient Face Recognition Algorithm based on Hybrid Method of Eigen Faces and Gabor Filter
...Show More Authors

Face recognition is one of the most applications interesting in computer vision and pattern recognition fields. This is for many reasons; the most important of them are the availability and easy access by sensors. Face recognition system can be a sub-system of many applications. In this paper, an efficient face recognition algorithm is proposed based on the accuracy of Gabor filter for feature extraction and computing the Eigen faces. In this work, efficient compressed feature vector approach is proposed. This compression for feature vector gives a good recognition rate reaches to 100% and reduced the complexity of computing Eigen faces. Faces94 data base was used to test method.

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography
...Show More Authors

     Data transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Linguistic and Grammatical Studies in Yemen in A.H.7th Century: Linguistic and Grammatical Studies in Yemen in A.H.7th Century
...Show More Authors

Summary:
The A. H. 7th century had witnessed an obvious development
in the Yemeni scientific process. The most important reason
being the establishment of the Resooliy State (A. H. 626-858)
which had achieved economic and scientific prosperity in
various fields of knowledge. Its sultans had participated in
building schools, purchasing books, summoning of scientists,
presenting gifts, and encouraging scientific journeys in and out
of Yemen. Therefore, studies had thrived and authorship
widened, and there appeared not a few number of scientists..

View Publication Preview PDF
Publication Date
Thu Mar 22 2012
Journal Name
مجلة كلية التربية الاساسية
The effect of NPK fertilize on some physiological characters of Apium graveolens
...Show More Authors

The experiment was carried out to study the effect oftwo concentration of NPK 0.25 and 0.50g/kg soil on some physiological characters of Apium graveolens. The results showed that the both concentration increased percentage of germination, plant height, Length of roots, roots diameter, absolute growth rate (AGR), relative growth rate (RGR) and percentage of N, P and K in plants

Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
THE EFFECT OF RAMADI SEWAGE TREATMENT PLANT ON THE PHYTOPLANKTON AND SOME PHYSICO – CHEMICAL CHARACTERS IN EUPHRATES RIVER , IRAQ
...Show More Authors

Four localities were selected in Euphrates River and Ramadi sewage treatment plant to collect water samples monthly during the period between October 2001 to July 2002 . Total cell count of phytoplankton and its physico- chemical concentrations were determined . The study aimed to demonstrate the effect of Ramadi sewage treatment plant on Euhprates River . It is concluded that the sewage had an dilution effect for the total hardness , total alkalinity , electrical conductivity and salinity of Euphrates River , but it is also caused in the presence of a contaminated area . This was cleared from the depletion of dissolved oxygen and high values of biological oxygen demand with lower valuse of pH in this area . The water of Euphrates

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Steganography Encryption Secret Message in Video Raster Using DNA and Chaotic Map
...Show More Authors

       Recently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref