Preferred Language
Articles
/
ijs-7715
Constructing a Digital Certificate Authentication System for Classified Documents
...Show More Authors

             In this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Exploring the actual implementation of e-wallet application in Malaysia
...Show More Authors

E-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the th

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Copy Move Forgery Detection Using Forensic Images
...Show More Authors

     Digital images are open to several manipulations and dropped cost of compact  cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image  by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Color Image Steganography Using Gradient Selective Bezier Curves
...Show More Authors

     Internet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
...Show More Authors

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Financial technology as one of the recovery strategies of the Iraqi banking sector in the post-Covid-19 stage: An exploratory study
...Show More Authors

The research aims to employ one of the most important strategies for recovery from the crisis of the Covid-19 pandemic, which ravaged the economies of the entire world and its various sectors, including the banking sector, through financial technology that is based on digital transformation to achieve financial sustainability and the creation of innovative financial value chains in light of the decline in the banking sector as a result of The negative effects of the Covid-19 pandemic, be guided by the relevant international accounting standards to control the risks associated with financial technology. To recover from the Covid-19 crisis, the research came out with a set of recommendations, most notably financial technology from

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
The Al-Abiadh Valley Drainage Basin Environmental Aspects Extraction Using Quantitatively Morphometric Analyses of Shuttle Radar Topographic Mission Data
...Show More Authors

         The accurate extracting, studying, and analyzing of drainage basin morphometric aspects is important for the accurate determination of environmental factors that formed them, such as climate, tectonic activity, region lithology, and land covering vegetation.

This work was divided into three stages; the 1st stage was delineation of the Al-Abiadh basin borders using a new approach that depends on three-dimensional modeling of the studied region and a drainage network pattern extraction using (Shuttle Radar Topographic Mission) data, the 2nd was the classification of the Al-Abiadh basin streams according to their shape and widenings, and the 3rd was ex

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Reviews In Agricultural Science
Technological Advances in Soil Penetration Resistance Measurement and Prediction Algorithms
...Show More Authors

Soil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref