Preferred Language
Articles
/
ijs-676
Secret-Text by e-Abacus Diagram II
...Show More Authors

In this work, there will be upgraded on the work of (Mahmood and Mahmood , 2018) by finding a general rule of the code for any text made from any number of words by using James e-Abacus Diagram in partition theory

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Secret-Word by e-Abacus Diagram I
...Show More Authors

This experiment may be applied before with certain and special roles, but never applied under partition theory (Abacus James Diagram) conditions. Therefore, we would have to find an appropriate design for each character to enable us sending a word represented as increasing number with meaning only for beneficiaries.

View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
Replacing the Content in e-Abacus Diagram II
...Show More Authors

     In our normal life, we sometimes need a process of replacing something with another to get out of the stereotype. From this point of view, Mahmood’s attempted in the year 2020 to replace the content in the first main e-abacus diagram. He found the general rule for finding the value of the new partition after the replacement from the original partition. Here we raise the question: Can we find the appropriate mechanisms for the remainder of the main e-abacus diagram?

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
On GCYD-Method In e-Abacus Diagram
...Show More Authors

     We will provide a new method in this study that integrates two types of applications, namely Graph Theory and Conjugate Young Diagram, the idea of combining the graph and the Young diagram is presented by Ali And Mahmood, which is primarily based on the idea of the e-abacus diagram, the new method is called GCYD, it directly applies to the English letter section, which will be a two-layer coding. It makes it difficult to detect the word or sentence.

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Nov 05 2021
Journal Name
Iraqi Journal Of Science
Splitting the e-Abacus Diagram in the Partition Theory
...Show More Authors

In the partition theory, there is more then one form of representation of dedication, most notably the Abacus diagram, which gives an accurate and specific description. In the year 2019, Mahmood and Mahmood presented the idea of merging more than two plans, and then the following question was raised: Is the process of separating any somewhat large diagram into smaller schemes possible? The general formula to split e-abacus diagram into two or more equal or unequal parts was achieved in this study now.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)
...Show More Authors

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Topological Structure of Nested Chain Abacus
...Show More Authors

This paper focuses on developing a strategy to represent the -connected ominoes using an abacus. We use the idea of -connected ominoes with respect to a frame in modelling nested chain abacus. Then, we formulate and prove the unique connected partition for any -connected ominoes. Next, the topological structure of nested chain abacus is presented.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF