Preferred Language
Articles
/
ijs-6140
Video Steganography Method Based DWT

The video steganography is a technique to hide information inside video file.Whereas video Steganography is a very important task in real life where the users want to keep data, so the steganography process used for the secure data transmission from the sender to receiver through the internet. Least significant bit (LSB) insertion technique operates on LSB bit of the media file to hide the information bit. In this paper steganography technique used to hide the information inside compressed video as development of a standard method in order to benefit from the advantages of the compression process, which added to the video, these features are reduce storage size of video, and reduce bandwidth to transfer data in faster way with save time that requires transferring video during the network. The video compressed by using discrete wavelet transform DWT because it an efficient method that can be used to perform an efficient compression technique. The video contains number of frames played over a period of time. By using the proposed method can hide information in any number of these frames for various video sizes and in specific location of the pixels. And has been verified from performance of proposed method by retrieval original information without any lost, and by using several quality measures performance to measure the results of proposed method found it's a good, acceptable compare with results of other methods used in more researches.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Dec 05 2021
Journal Name
Iraqi Journal Of Science
Adaptive Motion Compensated Spatial Temporal Filter of Colonoscopy Video

   Colonoscopy is a popular procedure which is used to detect an abnormality. Early diagnosis can help to heal many patients. The purpose of this paper is removing/reducing some artifacts to improve the visual quality of colonoscopy videos to provide better information for physicians. This work complements a series of work consisting of three previously published papers. In this paper, optic flow is used for motion compensation, where a number of consecutive images are registered to integrate some information to create a new image that has/reveals more information than the original one. Colon images were classified into informative and noninformative images by using a deep neural network. Then, two different strategies were use

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Neurocomputing
Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain

Nowadays, the advances in information and communication technologies open the wide door to realize the digital world’s dream. Besides, within the clear scientific scope in all fields, especially the medical field, it has become necessary to harness all the scientific capabilities to serve people, especially in medical-related services. The medical images represent the basis of clinical diagnosis and the source of telehealth and teleconsultation processes. The exchange of these images can be subject to several challenges, such as transmission bandwidth, time delivery, fraud, tampering, modifying, privacy, and more. This paper will introduce an algorithm consisting a combination of compression and encryption techniques to meet such chall

... Show More
Scopus (6)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Shadow Elimination in Soccer Game Video using Background Subtraction and Sobel Operators

Object detection in real time is considered as a challenging problem. However, it is very important in a wide range of applications, especially in field of multimedia. The players and ball are the most important objects in soccer game videos and detecting them is a challenging task because of many difficulties, such as shadow and illumination, ball size, ball occluded by players or merged with lines, and similar appearance of players. To overcome these problems, we present a new system to detect the players and ball in real-time by using background subtraction and Sobel detection. The results were more accurate and approximately two times faster than those using only background subtraction.

Scopus (1)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Gas Sensor for Hazardous Nitrogen Dioxide Based on TiO2 Nanotube Synthesis via Electrochemical Method

Because of the quick growth of electrical instruments used in noxious gas detection, the importance of gas sensors has increased. X-ray diffraction (XRD) can be used to examine the crystal phase structure of sensing materials, which affects the properties of gas sensing. This contributes to the study of the effect of electrochemical synthesis of titanium dioxide (TiO2) materials with various crystal phase shapes, such as rutile TiO2 (R-TiO2NTs) and anatase TiO2 (A-TiO2NTs). In this work, we have studied the effect of voltage on preparing TiO2 nanotube arrays via the anodization technique for gas sensor applications. The results acquired from XRD, energy dispersion spectro

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (1)
Scopus
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Refractive Index Sensor Based on Micro- Structured Optical Fibers with Using Finite Element Method

In this paper a refractive index sensor based on micro-structured optical fiber has been proposed using Finite Element Method (FEM). The designed fiber has a hexagonal cladding structure with six air holes rings running around its solid core.  The air holes of fiber has been infiltrated  with different liquids such as water , ethanol, methanol, and toluene then sensor characteristics like ; effective refractive index , confinement loss, beam profile of the fundamental mode, and sensor resolution are investigated by employing the FEM. This designed sensor characterized by its low confinement loss and high resolution so a small change in the analyte refractive index could be detect which is could be useful to detect the change of

... Show More
View Publication Preview PDF