Preferred Language
Articles
/
ijs-5617
A proposal of Multimedia Steganography Algorithm based on Improved Least Significant Bit (LSB) Method

Because of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding text file with related image in gray-scale image. As well as we discuss the bit plane which is divided into eight different images when combination them we get the actual image. The findings of the research was the stego-image is indistinguishable to the naked eye from the original cover image when the value of bit less than four Thus we get to the goal is to cover up the existence of a connection or hidden data. The Peak to Signal Noise Ratio(PSNR) and Mean Square Error (MSE) value is calculated so that the quality of the cover image before and after the data hiding is evaluated.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Comparison Different Estimation Method for Reliability Function of Rayleigh Distribution Based On Fuzzy Lifetime Data

    In this study, we present different methods of estimating fuzzy reliability of a two-parameter Rayleigh distribution via the maximum likelihood estimator, median first-order statistics estimator, quartile estimator, L-moment estimator, and mixed Thompson-type estimator. The mean-square error MSE as a measurement for comparing the considered methods using simulation through different values for the parameters and unalike sample sizes is used. The results of simulation show that the fuzziness values are better than the real values for all sample sizes, as well as  the fuzzy reliability at the estimation  of the Maximum likelihood Method, and Mixed Thompson Method perform better than the other methods in the sense of MSE, so that

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improved High order Euler Method for Numerical Solution of Initial value Time- Lag Differential Equations

The goal of this paper is to expose a new numerical method for solving initial value time-lag of delay differential equations by employing a high order improving formula of Euler method known as third order Euler method. Stability condition is discussed in detail for the proposed technique. Finally some examples are illustrated to verify the validity, efficiency and accuracy of the method.

View Publication Preview PDF
Publication Date
Sun Jun 02 2024
Journal Name
Methods And Objects Of Chemical Analysis
Simultaneous Spectrophotometric Determination of Piroxicam, Naproxen, Diclofenac Sodium and Mefenamic Acid in Pharmaceutical Formulations by Partial Least Squares Method

A chemometric method, partial least squares regression (PLS) was applied for the simultaneous determination of piroxicam (PIR), naproxen (NAP), diclofenac sodium (DIC), and mefenamic acid (MEF) in synthetic mixtures and commercial formulations. The proposed method is based on the use of spectrophotometric data coupled with PLS multivariate calibration. The Spectra of drugs were recorded at concentrations in the linear range of 1.0 - 10 μg mL-1 for NAP and from 1.0 - 20 μg mL-1 for PIR, DIC, and MEF. 34 sets of mixtures were used for calibration and 10 sets of mixtures were used for validation in the wavelength range of 200 to 400 nm with the wavelength interval λ = 1 nm in methanol. This method has been used successfully to quant

... Show More
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Advance Science And Technology
MR Images Classification of Alzheimer's Disease Based on Deep Belief Network Method

Background/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the

... Show More
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Color Image Steganography Using Gradient Selective Bezier Curves

     Internet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators

The present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering
Scopus