Preferred Language
Articles
/
bsj-2085
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
International Journal Of Psychosocial Rehabilitation,
The Effect of Using Resistance and Medical Ozone Training on Testosterone and Some Physiological Variables in Swimmers
...Show More Authors

م.د. فاطمة حميد ،أ.م.د وفاء صباح محمد الخفاجي, International Journal of Psychosocial Rehabilitation,, 2020 - Cited by 1

View Publication
Publication Date
Fri Dec 01 2017
Journal Name
Rawaa Emad Jaloud And Fadia Falahfadia Falah
Isolation and Identification of Fungal Propagation in Iraqi Meat and Detection of Aflatoxin B1 Using ELISA Technique
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Determination of Nickel and Cobalt in Cosmetic Products Marketed in Iraq Using Spectrophotometric and Microfluidic Paper-based Analytical Device (µPADs) Platform
...Show More Authors

Two quantitative, environment-friendly and easily monitored assays for Ni (II) and Co (III) ions analysis in different lipstick samples collected from 500-Iraqi dinars stores located in Baghdad were introduced. The study was based on the reaction of nickel (II) ions with dimethylglyoxime (DMG) reagent and the reaction of cobalt (III) ions with 1-nitroso-2-naphthol (NN) reagent to produce colored products. The color change was measured by spectrophotometric method at 565 nm and 430 nm for Ni and Co, respectively, with linear calibration graphs in the concentration range 0.25-100 mg L-1 (Ni) and 0.5-100 mg L-1 (Co) and LOD and LOQ of 0.11 mg L-1 and 0.36 mg L-1 (Ni), and 0.15 mg L-1 an

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 04 2021
Journal Name
Nat. Volatiles & Essent. Oils
Using The Aqueous Extract Of Allium Sativum In Improvement Of Some Physiological And Immunological Parameter In Albino Rats
...Show More Authors

The current study was designated to investigate the effect ofAllium sativumon some physiological and immunological parameters in rats. thirty adult rats were divided into three groups (10 rat for each). G1: served as healthy control, G2 :rats were treated with 150 mg\kg of Allium sativum, G3: treated with 300 mg\kg of Allium sativum. All treated animals were givenorally for 30 days. The aspartate , ) ALT ( alanine transaminase on some parameters were investigated such as garlic effects of total and differential counts of white blood , ) LDH ( lactate dehydrogenase ), AST ( transaminase cells(WBC) like Lymphocyte, Monocyte, Neutrophil, Basophil, Eosinophil,as

... Show More
Publication Date
Tue Jul 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Classification and monitoring of autism using svm and vmcm
...Show More Authors

Autism is a lifelong developmental deficit that affects how people perceive the world and interact with each others. An estimated one in more than 100 people has autism. Autism affects almost four times as many boys than girls. The commonly used tools for analyzing the dataset of autism are FMRI, EEG, and more recently "eye tracking". A preliminary study on eye tracking trajectories of patients studied, showed a rudimentary statistical analysis (principal component analysis) provides interesting results on the statistical parameters that are studied such as the time spent in a region of interest. Another study, involving tools from Euclidean geometry and non-Euclidean, the trajectory of eye patients also showed interesting results. In this

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment Of Vascular And Lymphatic Vessels Density In Benign Vascular Lesions Using CD34 And D2-40 Immunohistochemical Markers
...Show More Authors

Background: Vascular tumors and malformations, comprising a broad category of lesions often referred to as vascular anomalies. Hemangioma, represents a variety of vascular lesions (both malformations and tumor), while lobular capillary hemangioma is a common vascular lesion of the skin and mucous membranes that occurs mainly in children and young adults. Lymphangiomas are malformations of the lymphatic system. At the level of light microscopy the small lymphatics vessels may be similar to capillaries and sometimes are only tentatively identified by the nature of their contents or by immunohistochemical staining procedure. This study aimed to assess the vascular and lymphatic vessels density in benign vascular lesions using CD34 and D2-40 im

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref