Preferred Language
Articles
/
ijs-10111
Linear Feedback Shift Registers-Based Randomization for Image Steganography
...Show More Authors

     Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount. These methods embed the data in a random location with a random amount, further enhancing the level of obfuscation. A pseudo-random binary key that is generated through a nonlinear combination of eight Linear Feedback Shift Registers (LFSRs) controls this randomness. The experimentation involves various 512x512 cover images. The first method achieves an average PSNR of 43.5292 with a payload capacity of up to 16% of the cover image. In contrast, the second method yields an average PSNR of 38.4092 with a payload capacity of up to 8%. The performance analysis demonstrates that the LSB-based method can conceal more data with less visibility, however, it is vulnerable to simple image manipulation. On the other hand, the DCT-based method offers lower capacity with increased visibility, but it is more robust.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 09 2023
Journal Name
Journal Of Educational And Psychological Researches
An Evaluation Study of the Classroom Activities within the Developed English Course (Flying High) for the High School First- Grade Students in View of Creative Thinking Skills
...Show More Authors

The study aims to examine the classroom activities of the developed English course (Flying High) for the high school first-grade students, identify creative thinking skills appropriate for this grade, and show the extent the classroom activities involve these skills from the female- teachers ‘point of view. The study adopted the descriptive survey method. The study community consists of all (50) English female-teachers who teach high school first grade in Arar city during the academic year (1440 -1441 A.H, the first semester). The study was applied to all respondents. The researcher used a questionnaire as a study tool. The study revealed that the female-teachers reported their disagreement and refusal of the classroom activities in th

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
College Of Islamic Sciences
The hadiths of Abdullah bin Amr bin Al-Aas، may God be pleased with them، that there is no room for diligence in them ((collecting and studying))
...Show More Authors

Research Summary


The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.

The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying

At the end of this rese

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of measurement and analysis of quality costs on continuous improvement: Applied research in the Directorate General for the distribution of electric power in the Middle Euphrates
...Show More Authors

The research aims to identify the theoretical foundations for measuring and analyzing quality costs and continuous improvement, as well as measuring and analyzing quality costs for the Directorate of Electricity Supply / Middle Euphrates and continuous improvement of the distribution of electrical energy,The problem was represented by the high costs of failure and waste in electrical energy result to the excesses on the network and the missing (lost) energy,Thus, measuring and analyzing quality costs for the distribution of electrical energy and identifying continuous improvement leads to a reduction in missing and an increase in sales, as the research reached many conclusions, the most important of which is the high percentage o

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Economics And Finance Studies
THE ROLE OF TARGET COST MANAGEMENT APPROACH IN REDUCING COSTS FOR THE ACHIEVEMENT OF COMPETITIVE ADVANTAGE AS A MEDIATOR: AN APPLIED STUDY OF THE IRAQI ELECTRICAL INDUSTRY
...Show More Authors

Scopus (15)
Scopus
Publication Date
Thu Sep 29 2022
Journal Name
Al–bahith Al–a'alami
Factors Affecting the Professional Performance of Editors of The News in Iraqi Satellite Channels - A research drawn from a Master Degree thesis
...Show More Authors

Information pollution is regarded as a big problem facing journalists working in the editing section, whereby journalistic materials face such pollution through their way across the editing pyramid. This research is an attempt to define the concept of journalistic information pollution, and what are the causes and sources of this pollution. The research applied the descriptive research method to achieve its objectives. A questionnaire was used to collect data. The findings indicate that journalists are aware of the existence of information pollution in journalism, and this pollution has its causes and resources.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 11 2025
Journal Name
Al–bahith Al–a'alami
Information Pollution in Iraqi Journalism…Study in Causes and Sources - A research drawn from a Master Degree thesis
...Show More Authors

Information pollution is regarded as a big problem facing journalists working in the editing section, whereby journalistic materials face such pollution through their way across the editing pyramid. This research is an attempt to define the concept of journalistic information pollution, and what are the causes and sources of this pollution. The research applied the descriptive research method to achieve its objectives. A questionnaire was used to collect data. The findings indicate that journalists are aware of the existence of information pollution in journalism, and this pollution has its causes and resources.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 11 2025
Journal Name
Karbala Journal Of Physical Education Sciences
Analytical Study Of Some Biomechanical Variables For Progress Phase Their Relationship To The Level Of High Player Weight Position When Performing Background Acrobatic Movements In Artistic Gymnastics Researchers
...Show More Authors

View Publication