Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of The Turkish-german Gynecological Association
Obstetric and neonatal complications in large for gestational age pregnancy with late gestational diabetes
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 31 2015
Journal Name
International Journal Of Advanced Research
BK polyomavirus and Cytomegalovirus Co-infections in renal transplant recipients: a single center study
...Show More Authors

Background: Opportunistic viral infections make an important threat to renal transplantation recipients (RTRs), and with the use of more intense newly-developed immunosuppressive drugs; the risk of renal allograft loss due to reactivation of these viruses has increased considerably. At the top priority of these viruses lie BK polyomavirus (BKV) and human cytomegalovirus (CMV). Reactivation of these viruses in these chronically immunosuppressed RTRs can lead to renal impairment and subsequently allograft loss, unless early detected and properly treated. Objectives: The study aimed to detect and quantify plasma viral load of BKV and CMV in RTRs using quantitative real time PCR (qRT-PCR), in order to study the prevalence of these two viruses i

... Show More
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Biotechnology
Detection of E. coli and rotavirus in diarrhea among children under five years old‏
...Show More Authors

Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
Nitrification and urea hydrolysis in arid soil amended with different levels of bio-solid
...Show More Authors

Scopus
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical & Cellular Archives
TOXOPLASMOSIS, DIABETES AND SOME IMMUNE FACTORS THAT EFFECT ON THE BURDEN OF PATIENTS’ IMMUNITY
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Feb 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of canal dryness and flaring on the accuracy of two electronic apex locators
...Show More Authors

Background: This in vitro study evaluated the effect of canal dryness and flaring on the accuracy of two electronic apex locators for working length (WL) determination. Materials and methods: Sixty extracted teeth were used, after access opening was done, the occlusal surface was flattened to create stable reference point. The teeth were randomly divided into two equal main groups of flared and unflared group each one of 30 teeth. The flaring was done with Gates Glidden drills. The two main groups were further subdivided into two subgroups: dry canal and wet canal using 5.25% sodium hypochlorite groups, Electronic WL of each sample was determined using both Root ZX and i-Root apex locator. Consequently, histologic WL was determined by shav

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Advanced Research
Detailed Surface Photometry of the Spiral Galaxies NGC 7339, NGC 7537, and NGC 7541
...Show More Authors

The results of analyzing BVRI CCD photometry of the spiral galaxies NGC 7339, NGC 7537, and NGC 7541 are presented using the observations acquired with the 1.88m Kottamia telescope (Egypt). The overall structure of the galaxies is analyzed together with isophotal contour maps. The surface brightness profiles of the galaxies are decomposed to bulge and disk components by fitting a de Vaucouleurs law for the bulge and an exponential law for the disk to obtain photometric parameters for each component. The corrected total and absolute magnitudes and integrated color are also obtained and found to be close to the published values. The radial profiles of ellipticity, major-axis position angle, and color are also obtained and discussed.

View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Physics: Conference Series
Study electron transport coefficients for Ar, O2 and their mixtures by using EEDF program
...Show More Authors

Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Message in the tune of readers and denial to those who say infidelity tunes
...Show More Authors

Message in the tune of readers and denial to those who say infidelity tunes

View Publication Preview PDF