Preferred Language
Articles
/
bsj-4511
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality of the retrieved image and to improve its perceived quality.

The values of information measures are calculated through practical experiments of (perceptibility, robustness, capacity) by using interpolation technique and structural similarity measures. Experimental results show that the use of these measures (PSNR, MSE, and SSIM) has improved the image quality by 87% and has produced values of PSNR (38-41 dB), MSE = 0.6537 and SSIM= 0.8255. The results also demonstrate a remarkable progress in the field of hiding information and the increasing difficulty of detecting it by humans and machines.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Al–bahith Al–a'alami
The Mental Image of the Iraqi Policeman in the Anbar Province
...Show More Authors

The study of images in the cognitive field receives considerable attention by researchers, whether in the field of media and public relations or in other humanities. Due to the great importance in shaping trends of public opinion, especially trends that individuals and the behaviors of people, institutions or ideas are determined by forming images that they hold in their minds towards these persons or institutions. Modern enterprises have realized, whether they are governmental ministries and official departments or non-governmental organizations as civil society organizations, the importance of studying the dominant image in the minds of the masses and make decisions and draw plans to configure this image as these institutions wishes.&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
The image of the soldier in contemporary Iraqi painting
...Show More Authors

The research tagged (the image of the soldier in contemporary Iraqi painting) dealt with the concept of the image as one of the basic concepts in the creative achievement, whether it is in the field of art, literature or beauty. Therefore, the concept of the image expanded to express the various aspects of human creativity, including the field of painting. To know the image of the soldier in contemporary Iraqi painting, the research included four chapters. The first chapter focused on the methodological framework of the research, while the second chapter included three sections. The first topic dealt with the philosophical and artistic concept of the image. The second topic was concerned with the representations of the soldier's image in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Employ of Public Relations in Building Awareness of Security against Terrorism A Survey of the Employees of the Directorate General of Public Relations and Media at the Ministry of Interior
...Show More Authors

This study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
The effect of different flooding ratio on Al-Shuwaija marsh
...Show More Authors

In this research, the effect of changing the flood level of Al-Shuwaija marsh was studied using the geographic information systems, specifically the QGIS program, and the STRM digital elevation model with a spatial analysis accuracy of 28 meters, was used to study the marsh. The hydraulic factors that characterize the marsh and affecting on the flooding such as the ranks of the water channels feeding the marsh and the degree of slope and flat areas in it are studied. The area of immersion water, the mean depth, and the accumulated water volume are calculated for each immersion level, thereby, this study finds the safe immersion level for this marsh was determined.

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Environmental pollution of solid waste and methods of managing it Study in Ramadi Municipality Case
...Show More Authors

The current research aims at finding out how to properly and correctly manage waste and solid waste and reduce the difficulties faced by all countries. However, it is becoming increasingly acute in developed cities because their economies are growing rapidly. It is necessary to identify the modern methods used in developed countries in managing wastes. The use of modern waste management techniques is a coordinated effort by international agencies within the borders responsible for them. The problem of the study can be identified in the lack of clarity of environmental management procedures in place. The importance of the research contributes to providing greater capacity to the administrative and technical leadership in the municipality

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Traveling Wave Solutions of Fractional Differential Equations Arising in Warm Plasma
...Show More Authors

This paper aims to study the fractional differential systems arising in warm plasma, which exhibits traveling wave-type solutions. Time-fractional Korteweg-De Vries (KdV) and time-fractional Kawahara equations are used to analyze cold collision-free plasma, which exhibits magnet-acoustic waves and shock wave formation respectively. The decomposition method is used to solve the proposed equations. Also, the convergence and uniqueness of the obtained solution are discussed. To illuminate the effectiveness of the presented method, the solutions of these equations are obtained and compared with the exact solution. Furthermore, solutions are obtained for different values of time-fractional order and represented graphically.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 06 2019
Journal Name
Ssociation Of Arab Universities Journal Of Engineering Sciences
Application of Artificial Neural Network and GeographicalInformation System Models to Predict and Evaluate the Quality ofDiyala River Water, Iraq
...Show More Authors

This research discusses application Artificial Neural Network (ANN) and Geographical InformationSystem (GIS) models on water quality of Diyala River using Water Quality Index (WQI). Fourteen water parameterswere used for estimating WQI: pH, Temperature, Dissolved Oxygen, Orthophosphate, Nitrate, Calcium, Magnesium,Total Hardness, Sodium, Sulphate, Chloride, Total Dissolved Solids, Electrical Conductivity and Total Alkalinity.These parameters were provided from the Water Resources Ministryfrom seven stations along the river for the period2011 to 2016. The results of WQI analysis revealed that Diyala River is good to poor at the north of Diyala provincewhile it is poor to very polluted at the south of Baghdad City. The selected parameters wer

... Show More