Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 23 2017
Journal Name
International Conference Of Reliable Information And Communication Technology
Classification of Arabic Writer Based on Clustering Techniques
...Show More Authors

Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio

... Show More
Scopus (5)
Scopus
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Effects of rotation and MHD on the Nonlinear Peristaltic Flow of a Jeffery Fluid in an Asymmetric Channel through a Porous Medium
...Show More Authors

In this paper, the effect of both rotation and magnetic field on peristaltic transport of Jeffery fluid through a porous medium in a channel are studied analytically and computed numerically. Mathematical modeling is carried out by utilizing long wavelength and low Reynolds number assumptions. Closed form expressions for the pressure gradient, pressure rise, stream function, velocity and shear stress on the channel walls have been computed numerically. Effects of Hartman number, time mean flow, wave amplitude, porosity and rotation on the pressure gradient, pressure rise, stream function, velocity and shear stress are discussed in detail and shown graphically. The results indicate that the effect of Hartman number, time mean flow, wave a

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Impacts of Heat and Mass Transfer on Magneto Hydrodynamic Peristaltic Flow Having Temperature-dependent Properties in an Inclined Channel Through Porous Media
...Show More Authors

In this paper, we study the impacts of variable viscosity , heat and mass transfer on magneto hydrodynamic (MHD) peristaltic flow in a asymmetric tapered inclined channel with porous medium . The viscosity is considered as a function of temperature. The slip conditions at the walls were taken into consideration. Small
Reynolds number and the long wavelength approximations were used to simplify the governing equations. A comparison between the two velocities in cases of slip and no-slip was plotted. It was observed that the behavior of the velocity differed in the two applied models for some parameters. Mathematica software was used to estimate the exact solutions of temperature and concentration profiles. The resolution of the equatio

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Journal Of Computational Innovation And Analytics (jcia)
PERFORMANCE MEASURE OF MULTIPLE-CHANNEL QUEUEING SYSTEMS WITH IMPRECISE DATA USING GRADED MEAN INTEGRATION FOR TRAPEZOIDAL AND HEXAGONAL FUZZY NUMBERS
...Show More Authors

In this paper, a procedure to establish the different performance measures in terms of crisp value is proposed for two classes of arrivals and multiple channel queueing models, where both arrival and service rate are fuzzy numbers. The main idea is to convert the arrival rates and service rates under fuzzy queues into crisp queues by using graded mean integration approach, which can be represented as median rule number. Hence, we apply the crisp values obtained to establish the performance measure of conventional multiple queueing models. This procedure has shown its effectiveness when incorporated with many types of membership functions in solving queuing problems. Two numerical illustrations are presented to determine the validity of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 17 2022
Journal Name
Al–bahith Al–a'alami
The role of public relations in educating the Palestinian public about the issue of prisoners under the occupation An applied study on the employees of the Ministry of Detainees and Ex-Prisoners Affairs
...Show More Authors

The issue of Palestinian prisoners inside the prisons of the Israeli occupation is considered
a humanitarian issue par excellence، as it affects every Palestinian family as a
result of the absence of a husband، wife or son.
Almost no Palestinian house is vacant without one or more prisoners، and even women،
children and the elderly are not spared from these arrests.
The problem of the study was to identify the role of public relations in the Ministry
of Detainees and Ex-Prisoners Affairs in educating the Palestinian public about the
issue of prisoners، the nature of this role and the means used to bring support and
solidarity with this important and sensitive issue through the applied study on the
employee

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Al–bahith Al–a'alami
Skills of Media Marketing of the Public Relations Staff: (University of Baghdad as a Model)
...Show More Authors

Departments and offices of public relations and media in any institution or company is the most important departments that reflect the results of their work negatively or positively on their reputation. This goes beyond the trust and credibility that its internal and external audiences will give it. Where such matter requires the staff, working in these departments and offices, to have communication skills that qualify them to do the role of marketing the communication message. Yet, the communication skills of public relations and media staff vary from person to person depending on the communication position. This skill has two criteria: Achieving the communication goal and the speed in achieving it as a number of skills

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
Considerable use of computers and the Internet in managing public relations activities The Ministries of Justice and the Interior are examples
...Show More Authors

She noted most of the results of research conducted on the use of computers and the Internet in the areas of administrative, economic, agricultural and educational to a significant improvement in learning outcomes of these groups in the development of mechanisms of action, has increased rates of computer use and applications in various spheres of life at very fast pace so that the computer and the Internet is a vital part of any activity, whether administrative or research or the media, hence it can be said that the use of computers and the Internet in the management of public relations activities in any organization can accelerate the pace of echo positive goals and purposes of public relations, this study comes to looking at us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cryptography with Dynamic DNA Depending on Edge Detection
...Show More Authors

Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR

View Publication Preview PDF
Crossref