Preferred Language
Articles
/
ijp-648
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect presence of hidden image. Measures calculations of SNR, SNR segmental, SNR spectral, MSE and correlation show that, audio music cover file (2channales) is the safest uses as arrier with replace the 9 number of LSB without noticeable noise. Bits of secret message can be hiding capacity reach up to 28 % of the total music cover audio size and the three type's measures of SNR are 32, 28 and 31 dB. For speech cover audio the replacing LSB is safely uses at LSB bits number 6, where the hiding capacity is reach up to 37 % of size speech cover audio at 37, 36 and 39 dB for three type's measures of SNR. Correlation of cover samples was did not effected as a result of hiding secret image, where its value is up to 0.99 for all hiding operations.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
In Vitro Study of MefenamateStarch as Drug Delivery System
...Show More Authors

Mefenamic acid was esterified with starchwith[1:1] Molar ratio, as drug substituted with natural polymer, to prolongthe period of hydrolysis of drug polymer with other advantages. The new prodrug starch was characterized by FT-IR and UV-Visible and 1H-NMR spectroscopies. The physical properties were studied and controlled drug release was studied in different pH values at 37oC. The stability of drug was carried out by measuring the absorbance of mefenamic starch which hydrolyzed in HCl solution of pH 1.1 (artificial gastric fluid) and phosphate buffer of pH 7.4 (simulating intestinal fluid SIF) at 37oC for several days. The thermal analysis such as DSC was studied.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2016
Journal Name
European Journal Of Oral Sciences
Experimental polyethylene-hydroxyapatite carrier-based endodontic system: an in vitro study on dynamic thermomechanical properties, sealing ability, and measurements of micro-computed tomography voids
...Show More Authors

The dynamic thermomechanical properties, sealing ability, and voids formation of an experimental obturation hydroxyapatite-reinforced polyethylene (HA/PE) composite/carrier system were investigated and compared with those of a commercial system [GuttaCore (GC)]. The HA/PE system was specifically designed using a melt-extrusion process. The viscoelastic properties of HA/PE were determined using a dynamic thermomechanical analyser. Human single-rooted teeth were endodontically instrumented and obturated using HA/PE or GC systems, and then sealing ability was assessed using a fluid filtration system. In addition, micro-computed tomography (μCT) was used to quantify apparent voids within the root-canal space. The data were statistically analys

... Show More
View Publication
Crossref (6)
Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Evaluation of the Influence of De-sanding (Recycling System) Process on the Pile Bearing Capacity Using Full Scale Models
...Show More Authors

The present study investigates the effect of the de-sanding (recycling system) on the bearing capacity of the bored piles. Full-scale models were conducted on two groups of piles, the first group was implemented without using this system, and the second group was implemented using the recycling system. All piles were tested by static load test, considering the time factor for which the piles were implemented. The test results indicated a significant and clear difference in the bearing capacity of the piles when using this system. The use of the recycling system led to a significant increase in the bearing capacity of the piles by 50% or more. Thus it was possible to reduce the pile length by (15 % or more) thus, and implementation costs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Enhanced RC5 Key Schedule Using One-Dimensional Cellular Automata for Audio File Encryption
...Show More Authors

Audio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data.  In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) i

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Engineering And Technology Journal
Analysis of the Capacity, Spectral Efficiency and Probability of Outage of Adaptive Mobile Channel for WiMAX System
...Show More Authors

Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Secret-Text by e-Abacus Diagram II
...Show More Authors

In this work, there will be upgraded on the work of (Mahmood and Mahmood , 2018) by finding a general rule of the code for any text made from any number of words by using James e-Abacus Diagram in partition theory

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Audio Lesson at the Glass (311 H)
...Show More Authors

The acoustic efforts of the glass were found in the meanings mixed with other linguistic, grammatical and morphological issues, as the glass was not allocated to the detective or separate chapters in the meanings. The glass-walled in the audio lesson according to the doctrine of the optical, has stated so in several places of its meaning. Glass is interested in mentioning the strong qualities that have a great impact in the chorus and replacements such as loudness, dishes, arrogance, whistling, repetition, and richness. Glass was concerned with the phenomenon of diphtheria great care, and explained its purpose of seeking lightness and ease of pronunciation, and Siboe agreed in its origins and issues, and the glass used three criteria in

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Secret-Word by e-Abacus Diagram I
...Show More Authors

This experiment may be applied before with certain and special roles, but never applied under partition theory (Abacus James Diagram) conditions. Therefore, we would have to find an appropriate design for each character to enable us sending a word represented as increasing number with meaning only for beneficiaries.

View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
...Show More Authors

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Electronic Security And Digital Forensics
LSB based audio steganography preserving minimum sample SNR
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref