Preferred Language
Articles
/
ijs-3024
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and receiving it through a demultiplexer network using an electronic workbench. The outcome of the new algorithm demonstrates good efficiency, high security, and robustness and is executed quickly. The system is evaluated through the measurements of mean square error, peak signal-to-noise ratio, correlation, histogram, and capacity.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Degree to which Arabic Language Teachers at the Secondary Stage Possess the Teaching Competencies Necessary to Develop the Literary Appreciation Skills of Their Students from the Point of View of Educational Leaders in Bisha Governorate
...Show More Authors

This study aims to identify the degree of Arabic language teachers at the secondary stage possessing the teaching competencies necessary to develop the skills of literary savor among their students from the perception of educational leaders in Bisha Province. To achieve the objectives of the study, the descriptive approach was used by adopting a comprehensive survey method. The study sample consisted of (48) school principals and Arabic language supervisors in Bisha Province who supervise the teaching of Arabic language at the secondary level in Bisha Province. The necessary data was collected using a questionnaire. The results of the study revealed that the evaluation of the study sample for the degree to which Arabic language teachers

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 19 2022
Journal Name
Journal Of The College Of Languages (jcl)
Evaluation of proverb translation in Nahj al-Balagheh based on the theory of Peter Newmark (Dashti, Shahidi and Foladvand): ارزیابی ترجمه ضرب‌المثل‌ در نهج البلاغه بر اساس نظریه پیتر نیومارک. مطالعۀ موردی: (دشتی، شهیدی و فولادوند)
...Show More Authors

In addition to being a religious book with high human and moral themes, Nahj al-Balagha is considered a mirror of Arab culture and a literary masterpiece at the height of eloquence and eloquence, and because proverbs in the form of short, concrete and understandable phrases for everyone, experiences, thoughts and convey ideas, Imam Ali (AS) used it to facilitate the understanding of various political, social and moral concepts. In this article, we intend to criticize the way Dashti, Shahidi and Foladvand translated it by using Newmark's model due to the importance and cultural reflections of proverbs in understanding the cultural atmosphere governing Nahj al-Balagheh. In his evaluation model, Newmark divides cult

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Al-rafidain Journal Of Computer Sciences And Mathematics
Braille Character Recognition System: Review
...Show More Authors

The Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell transcription and Braille cell recognition are the two basic phases that follow one another. The Braille Recognition System is a technique for locating and recognizing a Braille document stored as an image, such as a jpeg, jpg, tiff, or gif image, and converting the text into a machine-readable format, such as a text file. BCR translates an image's pixel representation into its character representation. As workers at visually impaired schools and institutes, we profit from Braille recognition in a variety of ways. The Braille Recognition S

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Free Vibration Analysis for Dynamic Stiffness Degradation of Cracked Cantilever Plate
...Show More Authors

 

In the present work a dynamic analysis technique have been developed to investigate and characterize the quantity of elastic module degradation of cracked cantilever plates due to presence of a defect such as surface of internal crack under free vibration. A new generalized technique represents the first step in developing a health monitoring system, the effects of such defects on the modal frequencies has been the main key quantifying the elasticity modulii due to presence any type of un-visible defect. In this paper the finite element method has been used to determine the free vibration characteristics for cracked cantilever plate (internal flaws), this present work achieved by different position of crack. Stiffness re

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
International and regional alliances polarization.. Case study IRAQ
...Show More Authors

Abstract Iraq has an important place in the regional and international balance, and the competition among countries has increased in rapprochement with Iraq, not only for its geography or its privileged location, but because it has many other components that make regional and international countries want to strengthen their relations with it (Regional and international powers). In addition to that, Iraq has become increasingly important for these international and regional powers after its victory over the terrorist organization (ISIS), which proved an important fact that Iraq represents the most important pillars in the international balance.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
College Of Islamic Sciences
Moderate discourse and civil peace
...Show More Authors

Abstract

  Currently, the “moderate discourse and civil peace” represents a rich and important topic for scholars, due the rise of waves of extremism and Islamophobia campaigns, and what that leads to in term of imbalance in relations between nations and peoples.

Based on that, the research approach was to tackle the culture of hatred and calls for the clash of civilizations.

In order to contribute to solving these problems caused by cultural and religious prejudices, I decided to address the topic of “moderate discourse and civil peace” through two essential axes:

  • Features of moderate religious discourse
  • The role of moderate discourse in establishing communit

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Multibiometric System with Runs Bits Permutation for Creating Cryptographic key Generation Technique
...Show More Authors

    The context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is  now  the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce  identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the  robust system.  In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several man

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
FPGA Realization of Two-Dimensional Wavelet and Wavelet Packet Transform
...Show More Authors

 

The Field Programmable Gate Array (FPGA) approach is the most recent category, which takes the place in the implementation of most of the Digital Signal Processing (DSP) applications. It had proved the capability to handle such problems and supports all the necessary needs like scalability, speed, size, cost, and efficiency.

In this paper a new proposed circuit design is implemented for the evaluation of the coefficients of the two-dimensional Wavelet Transform (WT) and Wavelet Packet Transform (WPT) using FPGA is provided.

In this implementation the evaluations of the WT & WPT coefficients are depending upon filter tree decomposition using the 2-D discrete convolution algorithm. This implementation w

... Show More
View Publication Preview PDF