Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Wed Jun 29 2022
Journal Name
Baltic Journal Of Law & Politics
The Geomorphological Aspects in Diyala Governorate and the Possibility of Investing Them for Tourism Activity According to the Perspective of Sustainable Development Using RS and GIS Techniques
...Show More Authors

Diyala Governorate has many unique and diverse geomorphological features that the region enjoys, which are among the attractions for natural tourism, as the natural environment is considered a maker of tourism. The importance of geomorphological aspects as components of natural tourism is due to their association with tourism and entertainment, as a result of the enjoyment of many geomorphological aspects of the beauty of its natural landscape on the one hand, and on the other hand, the association of these manifestations with different types of tourism activity. Any tourist area as it is the main factor for tourist attractions, such as the presence of the Hamrin hills, and sand dunes. Planning for the development of tourism activity in the

... Show More
Preview PDF
Publication Date
Sun May 22 2022
Journal Name
International Journal Of Early Childhood Special Education
The effectiveness of the electronic public relations of Al- Shuhadaa Establishment: an analytical study of the website contents, the official social networking sites of Al- Shuhadaa Establishment
...Show More Authors

public relations at Al-Shuhadaa Establishment: an analytical study of social networking sites and the website) came to know and monitor the contents of social networking sites for Al-Shuhadaa Establishment, the research problem was represented by the main question: (What is the effectiveness of social networking sites and the website of Al-Shuhadaa Establishment) ,This research was classified within the descriptive research, and the two researchers adopted the survey method in order to achieve the objectives of the research, and they used the tool: content analysis as a research tool, the analysis of the contents included the official website of the establishment (Instagram page), and other social networking sites that Al-Shuhadaa Establish

... Show More
Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Proposed model for the work of audit committees in the public sector and its interaction with the Federal Board of Supreme Audit to reduce the incidents of fraud
...Show More Authors

This growing interest of the international scientific specialized commissions is due to the role that the audit committee can play, as one of companies’ governance tools, to increase the accuracy and transparency of the financial information disclosed by the companies, through its oversight role on the process of preparing financial reports, its supervision on the internal audit function within the companies, and supporting its independency, as well as coordinating the efforts between the internal control unites and the external auditor represented by the (Board of Supreme Audit) to clear the observations and irregularities in order to reduce the fraud cases.

This research was built on an applied sample of audit committee works

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An evaluation of three fissure sealants microleakage with presence or absence of bonding agent through time intervals (In vitro study)
...Show More Authors

Background: Pit and fissure sealant have been considered an outstanding adjunct to oral health care in the decrease of occlusal caries onset and low progression. The aims of this in vitro study were to evaluate the marginal microleakage of three different types of fissure sealants (SDI, Tg and tetric N-flow) by time interval, one day and 45 days, in the presence or absence of bonding agent among maxillary and mandibular teeth. Materials and methods: Seventy two sound human maxillary and mandibular first premolar teeth were collected which were free from obvious carious lesions. The teeth were randomly divided into two main equal groups, group (1) and group (2), each group consists of (36) teeth involving equal numbers of maxillary and mandi

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Role of Education in Enhancing the Value of Citizenship in Children through the Interactive Life Process in Educational Institutions
...Show More Authors

The aim of the research is to diagnose the methods of enhancing the value of citizenship in children through the interactive life process in educational institutions; the descriptive approach was used to achieve the objective by identifying social theories that corresponded to the national value or the theoretical principles of citizenship education. The study focused on educational activities and their role in establishing values, national educational philosophy in interactive activities, as well as the presentation of previous studies on the subject of citizenship, and maps of each of the strategies of active learning, skills in the process of interactive life in the field of education, Institutions that have the responsibility to prom

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
...Show More Authors

     This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or  broken to  crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Instructional Program Concerning Healthy Lifestyle on Patients’ Attitudes after Percutaneous Coronary Intervention at Cardiac Centers in Baghdad City
...Show More Authors

Abstract:

Objective: The study’s aim to evaluate the effectiveness of instructional program about healthy lifestyle on patients’ attitudes after undergoing percutaneous coronary intervention.

Methodology: Quasi-experimental design/ has been utilized for the current study starting from December 2018 to March 2020 to achieve the objectives of the study. Non-probability (purposive) sample of 60 patients was divided into intervention and control groups. Data were analyzed by the application of descriptive and inferential statistical methods.

Results: findings reported that before intervention both study and control groups demonstrated low total mean of score relat

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Multiwavelet based-approach to detect shared congestion in computer networks
...Show More Authors

Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
The Use of Gamma Ray Log Data to Compute and Study the Deposition of Shale Volume of Mishrif Formation in Middle and Southern Parts of Iraq
...Show More Authors

The shale volume is one of the most important properties that can be computed depending on gamma ray log. The shale volume of Mishrif Formation (carbonate formation from middle Cenomanian- early Turonian) was studied for the regional area of the middle and southern parts of Iraq. The gamma ray log data from seventeen  wells ( Kf-3,Kf-4, Ad-1,Ad -2,Dh-1, Bu-47, Ns-2, Ns-4, Am-1,Am-2,Hf-2,Hf-115,Mj-3,Mj-15, Su-7,Wq-15 and  Lu-7) distributed in the study area were used to compute the shale volume of Mishrif Formation. From the available data of the considered wells, a regional isopach map of Mishrif Formation was obtained. The isopach map indicates that the maximum thickness of Mishrif Formation is located at the eastern part of t

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref