Preferred Language
Articles
/
ZBautYcBVTCNdQwCzl6-
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
Perceptual Curiosity among Students of Religious Schools in Anbar Province
...Show More Authors

Abstract

The aim of the research is to identify the cognitive curiosity of students of religious schools in the al-Anbar Governorate. The sample consisted of (346) students from the secondary stage in religious schools affiliated with the Department of Religious Education and Islamic Studies. The sample included (232) males, (114) females, and (225) represented the intermediate stage, (121) represented the preparatory stage in religious schools. The researcher developed a scale of perceptual curiosity comprising (30) items with three alternatives (always applicable to me, rarely applicable to me, not applicable to me). The results showed that religious school students have a perceptive curiosity; there are no sta

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Perceptual for enrolled and not enrolled the puplis in kindergartens (comparative study)
...Show More Authors

Enrollment in kindergarten child accomplishes many positive aspects, that’s what Im sure a lot of modern educational trends in child education preschool in the importance of exposing children to a variety of sensory stimuli that contribute to impart a range of sound concepts.

Current research aims to know:

1.the level of sensory perception in the first primary grade students a sample search.

2.differences in perception of elementary first-graders with variable gender male, female))   3.differences in perception of the first primary grade students attending and not attending kindergarten in accordance with variable attendance (attending, not attending).

school students (first grade) from attendi

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Mon Jan 01 2007
Journal Name
2007 Ieee International Conference On Signal Processing And Communications
Fast Multi-level Image Vector Quantization
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Wed May 29 2019
Journal Name
Journal Of Planner And Development
Use of temporary interventions to reclaim neglected urban spaces
...Show More Authors

The research deals with one of the urban problems facing cities, namely the existence of neglected urban spaces that need to be activated , These spaces give a negative image of the city, is not conducive to life and social interactions or the city has a one distinctive urban experience, leading to a reduction peoples' confidence in revisiting of those areas, hinder the rest of the activities in that region . Because these spaces are of the basic components of the city and give it its identity through the elements and entities that constitute it  , The idea of research emerged in the reclaiming of these spaces within contemporary urban trends and the activation of  flexible  , short-term and inovation for that purpose with

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Dentistry
Influence of zirconia thickness and background color on color matching accuracy of monolithic zirconia restorations
...Show More Authors

objective: To evaluate the influence of monolithic zirconia brand, thickness, and substrate color on color matching accuracy when optically coupled to abutment substrates. Methods: A total of 180 samples of two brands of monolithic zirconia [Prettau Anterior (PA), Ceramill Zolid FX Multicolor (CZ)] were prepared in three different thicknesses (0.8 mm, 1.5 mm, and 2 mm) with a standardized 10 mm diameter. Color properties of the samples were assessed using spectrophotometry at baseline and after coupling to three substrate types: standard dentin, discolored dentin, and titanium. Color differences (ΔE) were calculated and statistically analyzed by 3-way ANOVA and pairwise comparison ( α=0.05). Results: The brand and material thickness, at

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref