Preferred Language
Articles
/
ijs-3024
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and receiving it through a demultiplexer network using an electronic workbench. The outcome of the new algorithm demonstrates good efficiency, high security, and robustness and is executed quickly. The system is evaluated through the measurements of mean square error, peak signal-to-noise ratio, correlation, histogram, and capacity.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
Improve the Spatial Resolution of Multispectral satellite Image using Different Image Sharpening Techniques
...Show More Authors

The process of combining the significant information from a series of images into a single image called image sharpening or image fusing, where the resultant fused image will be having more spatial and spectral information than any of the input images. in this research two images of the same place in different spatial resolution have been used the first one was panchromatic and the second image was multispectral with spatial resolution 0.5m and 2 m respectively. These images were captured by world view-2 sensor. This research resent four pan sharpening methods like (HSV, Brovey (color normalizes) , Gram shmidt and PCA)these methods were used to combine the adopted images to get multispectral image

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2012
Journal Name
I-manger's Journal On Information Technology
A MODULE FOR ENHANCING RECOGNITION SYSTEM FOR QR CODE SCANNED IMAGE
...Show More Authors

A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Effect of Genetic Algorithm as a Feature Selection for Image Classification
...Show More Authors

     Analysis of image content is important in the classification of images, identification, retrieval, and recognition processes. The medical image datasets for content-based medical image retrieval (  are large datasets that are limited by high computational costs and poor performance. The aim of the proposed method is to enhance this image retrieval and classification by using a genetic algorithm (GA) to choose the reduced features and dimensionality. This process was created in three stages. In the first stage, two algorithms are applied to extract the important features; the first algorithm is the Contrast Enhancement method and the second is a Discrete Cosine Transform algorithm. In the next stage, we used datasets of the medi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Qualification Of Human Resources To Apply Electronic Management A case study In The Ministry Of Science And Technology
...Show More Authors

     This research aims to shed light on the reality of the process of rehabilitation of human resources for the implementation of electronic management practice in the ministry, and availability requirements of the application of electronic management and diagnosis of the most important stages and steps that can be followed in the process of transition towards electronic management to keep abreast of developments in the field of information technology, has been the application of this research in the Ministry of science and technology on a group of heads of departments and directors of the people in the departments of the Ministry through the use of case study method, which includes cohabitation field intervi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun May 01 2022
Journal Name
Rimak International Journal Of Humanities And Social Sciences
BUILDING THE MEDIA MESSAGE AND DESIGNING IT THROUGH INFOGRAPHICS
...Show More Authors

The study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the

... Show More
View Publication
Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Color Image Steganography Using Gradient Selective Bezier Curves
...Show More Authors

     Internet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Nov 22 2019
Journal Name
Chalcogenide Letters
CONCENTRATION EFFECTS ON ELECTRONIC AND SPECTROSCOPIC PROPERTIES OF ZnCdS WURTZOIDS: A DENSITY FUNCTIONAL THEORY STUDY
...Show More Authors

Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Design and implementation of a Deep Learning-based Intelligent Electronic Lock Door Entry Control System
...Show More Authors

    The Internet of Things (IoT) technology and smart systems are playing a major role in the advanced developments in the world that take place nowadays, especially in multiple privilege systems. There are many smart systems used in daily human life to serve them and facilitate their tasks, such as alarm systems that work to prevent unwanted events or face detection and recognition systems. The main idea of this work is to capture live video using a connected Pi camera, save it, and unlock the electric strike door in several ways; either automatically by displaying a live video connected via USB webcam using a deep learning algorithm of facial recognition and OpenCV or by RFID technology, as well as by detecting abnormal entrance wit

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref