Preferred Language
Articles
/
ijs-7225
Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG

One of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the injection of one or two random kashida within the text. Linguistic steganography covers all the techniques that deal with using written natural language to hide secret message. This research presents a linguistic steganography for scripts written in Arabic language, using kashida and Fast Fourier Transform on the basis of a new technique entitled subtraction of two random Images (STRI) as location to hide a secret message. The proposed approach is an attempt to present a transform linguistic steganography using levels for hiding to improve implementation of kashida, and improve the security of the secret message by using subtraction two random Images (STRI). This method was tested in terms of security and capacity, transparency, and robustness and this is way better than previous methods. The proposed algorithms ideal for steganographic properties.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 24 2021
Journal Name
Journal Of The College Of Education For Women
Arabic Language Teachers’ Training Needs for Implementing Cognitive Trips Strategy when Teaching Arabic Language Courses in the Kingdom of Saudi Arabia: أمل ناصر الحربي, و وفاء العويضي

The present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
Trends of Arabic Language Teachers in the Secondary Stage towards Homework

The problem of the research is indicated by answering the following questions: 1) what are the attitudes of the Arabic language teachers towards homework?

2) Do the Arabic language teachers differ in their attitudes towards homework according to their specialization? 3) Do the Arabic language teachers differ in their attitudes towards homework according to their gender (male and female)? According to the three questions asked above, we may state the following hypotheses. There is no statistically significant difference between the average of the marks of Arabic language teachers in the real practice of the scale of the attitudes towards their homework and their average in the hypothetical practice of the

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography

     Data transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Teaching Methods Used Calendar When Arabic Language Teachers in Middle

This research aims to evaluate the teaching methods used by intermediate Arabic language teachers. To achieve the goal, the researcher followed the descriptive-analytical approach. The research sample was limited to Arabic language teachers at intermediate school for the academic year (2017-2018) the researcher chose a random sample included (155) teachers which form a (40%) Of the original community at Baghdad/ Rusafa1th. The researcher has developed standards of teaching methods which are (7) standards with (39) paragraphs included three alternatives. The results showed the need to pay attention to the use of various modern teaching methods. Moreover, the researcher suggested making an evaluation of the teaching methods used by Arabic

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Color Image Steganography Using Gradient Selective Bezier Curves

     Internet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Printed Arabic Characters Recognition Based on Minimum Distance Classifier Technique

     The printed Arabic character recognition are faced numerous challenges due to its character body which are changed depending on its position in any sentence (at beginning or in the middle or in the end of the word). This paper portrays recognition strategies. These strategies depend on new pre-processing processes, extraction the structural and numerical features to build databases for printed alphabetical Arabic characters. The database information that obtained from features extracted was applied in recognition stage. Minimum Distance Classifier technique (MDC) was used to classify and train the classes of characters. The procedure of one character against all characters (OAA) was used in determination the rate

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Hawkins' Strategy on the Achievement of Fourth Grade students in Arabic Language Grammar

Abstract

The research aims to examine the effect of Hawkins' strategy on students in the fourth grade of primary school in the General Directorate of Education in Baghdad / Karkh 3 for the academic year (2020-2021). The research was limited to the topics of the Arabic language grammar book for the fourth grade of primary school. The researcher developed the research hypothesis, which is: that there is no statistically significant difference at the significance level (0.05) between the average scores of the experimental group students who study using the Hawkins strategy and the average scores of the control group students who study in the traditional method in the achievement test. The researcher set a number of

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Preparing the Arabic Language Teacher for Non-Native Speakers, Following the Experience of the Arabic Language Institute at the International University of Africa: منى يوسف محمَّد وقيع الله

The study aims to examine the reality of preparing the Arabic language teacher for non-native speakers by presenting the experience of the Arabic Language Institute at the International University of Africa. Thus, it addresses the following questions: How is it possible to invest the long scientific experiences in proposal and experiment preperations to qualify Arabic language teachers for non-native speakers? What is the reality of preparing an Arabic language teacher at the Institute? How did the Arabic Language Institute process teacher preparation? What are the problems facing the preparation of the Arabic language teachers and the most important training mechanisms used in that Institute?What problems faced the implementation of the

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Vocabulary Learning Strategies Employed by English as Foreign Language Students at NBU University

ABSTRACT

Learning vocabulary is a challenging task for female English as a foreign language (EFL) students. Thus, improving students’ knowledge of vocabulary is critical if they are to make progress in learning a new language. The current study aimed at exploring the vocabulary learning strategies used by EFL students at Northern Border University (NBU). It also aimed to identify the mechanisms applied by EFL students at NBU University to learn vocabulary. It also aimed at evaluating the approaches adopted by EFL female students at Northern Border University (NBU) to learn a language. The study adopted the descriptive-analytical method. Two research instruments were developed to collect data namely, a survey qu

... Show More
View Publication Preview PDF