Preferred Language
Articles
/
PRdyXo8BVTCNdQwCVHTq
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.

Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Gait Recognition Based on Deep Learning
...Show More Authors

      In current generation of technology, a robust security system is required based on biometric trait such as human gait, which is a smooth biometric feature to understand humans via their taking walks pattern. In this paper, a person is recognized based on his gait's style that is captured from a video motion previously recorded with a digital camera. The video package is handled via more than one phase after splitting it into a successive image (called frames), which are passes through a preprocessing step earlier than classification procedure operation. The pre-processing steps encompass converting each image into a gray image, cast off all undesirable components and ridding it from noise, discover differen

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Mon Feb 21 2022
Journal Name
Научный форум: Филология, искусствоведение и культурология: сб. ст. по материалам Lv междунар. науч.-практ. конф. – No 1 (55). – М.
Metaphor and difficulties of its translation from Russian into Arabic
...Show More Authors

This article discusses a discussion of trends and patterns of understanding and application of the concept of metaphor to various subjects that may interfere with the perspective of metaphors in translation theory, an attempt was made to use the principles and characteristics of metaphors and their fundamental tradition in translation theory, and to uncover the perspective of considering metaphor as a conceptual process. presenting its merits, since it is still considered an eccentric expression of linguistics.

Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Investigating Color Idioms and their Translation from English into Arabic
...Show More Authors

Colors are universal, and throughout the ages, they have been associated with
various religious, social and spiritual meanings. They symbolize a galaxy of things
to designate certain ideas or symbols that are sometimes contradictory.
The present study is an attempt to investigate colors, their meanings and
symbolism, and the approaches to translating color idioms from English into
Arabic. It fathoms one of the thorny areas for translation theorists let alone
practitioners. Various definitions, classifications of types and symbolism across
cultures are provided. After reviewing idioms and methods of translating them, a
survey of 114 sentences that include color idioms was conducted to see which
method is mostly

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 02 2024
Journal Name
Translation&linguistics
Verbal forms in French and Iraqi Arabic: a contrastive study
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Mental motivation among students of Arabic language departments and its relationship to their attitudes towards the profession
...Show More Authors

The aim of the research is to know the level of mental motivation among students of the Arabic language departments in the Faculties of Education in the universities of Baghdad Governorate and its relationship to their attitudes towards the profession, and the level of orientation towards the profession among students of the Arabic language departments in the Faculties of Education. And the correlational relationship between mental motivation and career orientation among students of Arabic language departments in the Faculties of Education, and the current research is determined by students of Arabic language departments in the Faculties of Education and the universities (Education Ibn Rushd-  University of Baghdad, Education- &nbsp

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Clinicopathological Features and ICD-10 Categorization of Oro-maxillofacial Surgical Biopsies from Sulaimani
...Show More Authors

Background: Few updated retrospective histopathological-based studies in Iraq evaluate a comprehensive spectrum of oro-maxillofacial lesions. Also, there was a need for a systematic way of categorizing the diseases and reporting results in codes according to the WHO classification that helps occupational health professionals in the clinical-epidemiological approach.

Objectives: to establish an electronic archiving database according to the ICD-10 that encompasses oro-maxillofacial lesions in Sulaimani city for the last 12 years, then to study the prevalence trend and correlation with clinicopathological parameters.

Subjects and Methods:  A descri

... Show More
View Publication Preview PDF
Scopus Crossref