Preferred Language
Articles
/
gxbpvYoBVTCNdQwCoKQX
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using three different keys to make the system harder to break by outsider attackers (where the 1stand 3rdencryptions keys are numerical keys, while the 2ndkey is string). This system is done based on seven steps; the first step is converting the plaintext based on the first generated key that leads to substitute each character in plaintext, the second step is embedding second generated key with the message that want to send, the third step is done by converting text to their equivalent ASCII format. The fourth step is converting these ASCII format to Binary numbers; then, these numbers are shifted based on the third generated key. These binary numbers are converted to ASCII, and the last step is to convert ASCII to their equivalent characters. The achieved text is the ciphertext that will be sent.

Publication Date
Wed Feb 01 2023
Journal Name
Mathematical Models And Computer Simulations
Function Approximation Technique (FAT)-Based Adaptive Feedback Linearization Control for Nonlinear Aeroelastic Wing Models Considering Different Actuation Scenarios
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Aware of the roots of the text in the arab heritage
...Show More Authors

Text science presented a set of criteria to make the text essentially a project to create
texts and use. Me and means of cohesion script text scientists, two standard foundries and
knitting. Find this means their equivalent in the Arab rhetorical Heritage has been found, it
means foundries find Accompanying represented (link grammar in the classroom and link),
and referrals represented by (Baldmair, Ldefinition, and the name of the signal), and
deletion, and repetition, and presentation delays. As in the standard knitting it has confirmed
Albulagjun Arabs on the semantic consistency between the text components, as reflected in
the moral link in Chapter interfaces, as well as in moral coherence between parts of the te

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Temperature Effect on Power Drop of Different Photovoltaic Modules
...Show More Authors

Solar module operating temperature is the second major factor affects the performance of solar photovoltaic panels after the amount of solar radiation. This paper presents a performance comparison of mono-crystalline Silicon (mc-Si), poly-crystalline Silicon (pc-Si), amorphous Silicon (a-Si) and Cupper Indium Gallium di-selenide (CIGS) photovoltaic technologies under Climate Conditions of Baghdad city. Temperature influence on the solar modules electric output parameters was investigated experimentally and their temperature coefficients was calculated. These temperature coefficients are important for all systems design and sizing. The experimental results revealed that the pc-Si module showed a decrease in open circuit v

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 02 2022
Journal Name
Basic And Clinical Andrology
Effects of Covid-19 vaccination on different semen parameters
...Show More Authors
Abstract<sec> <title>Background

The possible effects of COVID-19 vaccines on reproductive health and male fertility in particular have been discussed intensely by the scientific community and the public since their introduction during the pandemic. On news outlets and social media platforms, many claims have been raised regarding the deleterious effects of COVID-19 vaccines on sperm quality without scientific evidence. In response to this emerging conflict, we designed this study to evaluate and assess the effect of the Pfizer-BioNTech mRNA COVID-19 vaccine on male fertility represented by the semen analysis parameters.

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 21 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of different oral hygiene regimens on the quantity of cariogenic plaque on orthodontic bands with different attachments (A clinical photographic study)
...Show More Authors

Background: Fixed orthodontic appliances impede the maintenance of oral hygiene and result in plaque accumulation leads to enamel demineralization caused by acids produced by bacteria. Studies on plaque control strategies in orthodontic populations are limited. This might be caused by difficulties in the quantitative evaluation of dental plaque because the teeth have various levels of bracket coverage, and different tooth sizes and malocclusions, making the traditional categorical indices complex. The present study aims to evaluate the effect of different hygiene protocols on plaque quantity on bands with different attachments. Materials and method: Twenty patients had four bands within the orthodontic appliance. Then randomly divided into

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Three Dimensional MHD Simulationof Comet Hale-Bopp Tail
...Show More Authors

The interaction between comet Hale-Bopp tail with the solar wind is investigated in the present paper using magneto-hydrodynamic (MHD) numerical simulation, which accounts for the presence of the interplanetary magnetic field (IMF). The simulation is based on three-dimensional Lax-Wendroff explicit scheme, providing second-order accuracy in space and time. The ions produced from the nucleus of the comet will add considerable effects on the microstructure of the solar wind, thus severely altering its physical properties. The present simulation focuses on careful analysis of these properties by means of simulating the behavior of the comet Hale-Bopp’s tail at 1 AU from the sun. These properties include the changes of the plasma density,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 17 2020
Journal Name
College Of Islamic Sciences
Human values and principles in the three religions
...Show More Authors

The laws of the three religions tend to extend the rules and foundations of coexistence, and this is achieved in achieving the values and principles that these laws have nourished in all societies.

Our research deals with a major problem that has broken out in our societies, namely (disturbing the balance of values and behavioral standard between people), and perhaps one of the greatest causes of the problem is to move away from the correct divine discourse and sound approach, as well as corruption of common sense and the violation of its rules and found principles in the hearts of people.

 

 

 

... Show More
View Publication Preview PDF