Preferred Language
Articles
/
ijs-3024
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and receiving it through a demultiplexer network using an electronic workbench. The outcome of the new algorithm demonstrates good efficiency, high security, and robustness and is executed quickly. The system is evaluated through the measurements of mean square error, peak signal-to-noise ratio, correlation, histogram, and capacity.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 04 2025
Journal Name
Al–bahith Al–a'alami
EMPLOYING TWITTER IN THE U.S. PRESIDENTIAL ELECTION CAMPAIGN IN 2016: U.S. PRESIDENTIAL CANDIDATE DONALD TRUMP’S TWEETS AS A “MODEL”: (A Research Drawn from a Master’s Thesis) (An Analytical Study)
...Show More Authors

This study aimed to identify the employment of the social networking platform «Twitter» in the 2016 presidential campaign led by the Republican candidate, Donald Trump; and analyse his tweets through his personal account on «Twitter»  for the period from: 10/ 8/2016 to: 11/ 8/2016 which represents the last month of the election campaign.

The study belongs to the type of descriptive studies using the analytical method through an analysis index that includes sub-categories and other secondary categories. The research has adopted the ordinary unit of information material (tweet) as an analysis unit for this purpose.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Radiological age estimation using third molars mineralization in a sample attending orthodontic clinics (A retrospective study)
...Show More Authors

Background: The evaluation of the chronological age is a practical method in crime investigation field that assists in identifying individuals to treat them as underage or adult. This study aimed to assess the stages of third molars mineralization in relation to chronological age of Iraqi individuals, determine the gender differences and arches (maxillary/mandibular) differences.

Materials and Methods: A total of 300 orthopantomograms of orthodontic patients were collected according to specific criteria and evaluated visually. The developmental stages of maxillary and mandibular third molars were determined according to Demirjian method. T

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The eloquence of the poetic image in the poetry of the Andalusian son of Labanism is a stylistic approach
...Show More Authors

The resort to the eloquence of the poetic image as a style reveals the poet's creativity and creativity in dealing with external influences, and reflect them with emotional images express a sense of intense emotional imagination, and this imagination stems from the experience of a poetic sense of truth, tasted by the recipient before the creator of the poetic text.

View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
The Intellectual as an Alien: A Study of Henry James's The Beast in the Jungle and James Joyce's "A Painful Case"
...Show More Authors

This research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE ROLE OF ELECTRONIC-PAYMENT SERVICE PROVIDERS IN THE DEVELOPMENT OF E-BANKING IN IRAQ - AN APPLIED RESEARCH IN CENTRAL BANK OF IRAQ
...Show More Authors

THE ROLE OF ELECTRONIC-PAYMENT SERVICE PROVIDERS IN THE DEVELOPMENT OF E-BANKING IN IRAQ - AN APPLIED RESEARCH IN CENTRAL BANK OF IRAQ

View Publication
Crossref
Publication Date
Tue Jun 13 2023
Journal Name
Journal Of Survey In Fisheries Sciences
Spectrum Analyzing X-ray Data Image (FITS) Using Ds9 Program
...Show More Authors

n this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Chaos-based Color Image Steganography Method Using 3 D Cat Map
...Show More Authors

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
A Reliable Iterative Transform Method for Solving an Epidemic Model
...Show More Authors

    The main purpose of the work is to apply a new method, so-called LTAM, which couples the Tamimi and Ansari iterative method (TAM) with the Laplace transform (LT). This method involves solving a problem of non-fatal disease spread in a society that is assumed to have a fixed size during the epidemic period. We apply the method to give an approximate analytic solution to the nonlinear system of the intended model. Moreover, the absolute error resulting from the numerical solutions and the ten iterations of LTAM approximations of the epidemic model, along with the maximum error remainder, were calculated by using MATHEMATICA® 11.3 program to illustrate the effectiveness of the method.

View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (6)
Crossref