Preferred Language
Articles
/
bsj-4511
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality of the retrieved image and to improve its perceived quality.

The values of information measures are calculated through practical experiments of (perceptibility, robustness, capacity) by using interpolation technique and structural similarity measures. Experimental results show that the use of these measures (PSNR, MSE, and SSIM) has improved the image quality by 87% and has produced values of PSNR (38-41 dB), MSE = 0.6537 and SSIM= 0.8255. The results also demonstrate a remarkable progress in the field of hiding information and the increasing difficulty of detecting it by humans and machines.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lossless Data Hiding Using L·SB Method
...Show More Authors

A loS.sless (reversible) data hiding (embedding) method  inside  an image  (translating medium)  - presented   in  the  present  work  using  L_SB (least  significant  bit). technique  which  enables  us to translate   data  using an  image  (host  image),  using  a  secret  key, to  be  undetectable  without losing  any  data  or  without   changing   the  size  and  the  external   scene (visible  properties) of the image, the hid-ing data is then can  be extracted (without  losing)   by reversing &n

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2004
Journal Name
Al-academy
تقييم قابلية اداء متطلبات العمل للعاملين في الصناعة باستخدام طريقة القصور الذاتي
...Show More Authors

تقييم قابلية اداء متطلبات العمل للعاملين في الصناعة باستخدام طريقة القصور الذاتي

View Publication Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Rotation and Magnetic Force Effects on Peristaltic Transport of Non -Newtonian Fluid in a Symmetric Channel
...Show More Authors

In this paper, the impact of magnetic force, rotation, and nonlinear heat radiation on the peristaltic flow of a hybrid bio -nanofluids through a symmetric channel are investigated. Under the assumption of a low Reynolds number and a long wavelength, the exact solution of the expression for stream function, velocity, heat transfer coefficient, induced magnetic field, magnetic force, and temperature are obtained by using the Adomian decomposition method. The findings show that the magnetic force contours improve when the magnitude of the Hartmann number M is high and decreases when rotation increases. Lastly, the effects of essential parameters that appear in the problem are analyzed through a graph. Plotting all figures is done using the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 17 2019
Journal Name
Iraqi Journal Of Physics
Classification of the galaxy Milky Way using variable precision rough sets technique
...Show More Authors

Astronomy image is regarded main source of information to discover outer space, therefore to know the basic contain for galaxy (Milky way), it was classified using Variable Precision Rough Sets technique to determine the different region within galaxy according different color in the image. From classified image we can determined the percentage for each class and then what is the percentage mean. In this technique a good classified image result and faster time required to done the classification process.

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The use of the Biz method and classical methods in estimating the parameters of the binary logistic regression model
...Show More Authors

Abstract

          Binary logistic regression model used in data classification and it is the strongest most flexible tool in study cases variable response binary when compared to linear regression. In this research, some classic methods were used to estimate parameters binary logistic regression model, included the maximum likelihood method, minimum chi-square method, weighted least squares, with bayes estimation , to choose the best method of estimation by default values to estimate parameters according two different models of general linear regression models ,and different s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Sun May 01 2016
Journal Name
2016 Al-sadeq International Conference On Multidisciplinary In It And Communication Science And Applications (aic-mitcsa)
Landsat-8 (OLI) classification method based on tasseled cap transformation features
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Using GIS Technique for evaluating water quality of Abu Zarag marsh during the flood season
...Show More Authors
Abstract<p>This research deals with the most important heritage in Iraq, which are the Iraqi marshes, especially Abu Zarag marsh in Al-Nasiriyah city south of Iraq. The research is divided into two parts. The first part deals with evaluating the water quality parameters of Abu Zarag marsh for the period from December 2018 to April 2019 which is the flooding season. The parameters are Temperature, pH, Electrical Conductivity, Total Dissolved Solids, Alkalinity, Total Hardness, Turbidity, Dissolved Oxygen, Sulfate, Nitrate. The second part is a comparison between the water quality parameters during the recent period with the same period during the previous years from 2014 to 2019. The results are </p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Study of nuclear structure for carbon isotopes using local scale transformation technique in shell model
...Show More Authors

This work is devoted to study the properties of the ground states such as the root-mean square ( ) proton, charge, neutron and matter radii, nuclear density distributions and elastic electron scattering charge form factors for Carbon Isotopes (9C, 12C, 13C, 15C, 16C, 17C, 19C and 22C). The calculations are based on two approaches; the first is by applying the transformed harmonic-oscillator (THO) wavefunctions in local scale transformation (LST) to all nuclear subshells for only 9C, 12C, 13C and 22C. In the second approach, the 9C, 15C, 16C, 17C and 19C isotopes are studied by dividing the whole nuclear system into two parts; the first is the compact core part and the second is the halo part. The core and halo parts are studied using the

... Show More
View Publication Preview PDF
Crossref (4)
Crossref