Preferred Language
Articles
/
jcoeduw-1015
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (15)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Rejuvenation of Facial Skin Using Fractional Er: YAG Laser
...Show More Authors

Fractional Er: YAG laser resurfacing is increasingly used for treating rhytides and photo aged skin because of its favorable benefit‐risk ratio. The multi-stacking and variable pulse width technology opened a wide horizon of rejuvenation treatments using this type of laser. To evaluate the efficacy and safety of the use of fractional 2940 nm Er: YAG laser in facial skin rejuvenation. Twelve female patients with mean age 48.3 years and multiple degrees of aging signs and solar skin damages, were treated with 2 sessions, one month apart by fractional Er: YAG laser. Each session consisted of 2 steps, the first step employed the use of the multi stack ablative fractional mode and the fractional long pulsed non-ablative mode settings were u

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Visible image watermarking using biorthogonal wavelet transform
...Show More Authors

In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effects of Interleukin-2 (IL-2) and Interleukin-6 (IL-6) in Recurrent Spontaneous Abortion (RSA)
...Show More Authors

         Recurrent Spontaneous Abortion (RSA) is the most painful experience for couples expecting a child. This study aimed to determine the relevance of IL-2 and IL-6 in recurrent spontaneous abortion (RSA).  Serum samples were collected from 90 women attend Al Kadhmiya teaching hospital in Baghdad. 60 women (first group) had recurrent abortion the women were negative for rubella virus, herpes simplex virus and toxplasma gondii. And they were negative from bacterial infection eg. Niesseria gonorrhea and Chlamydia trachomatis. The histopathological tests for fetus abnormalities were negative in this group, and 30 women (second group) with successful pregnancy (normal delivery). All samples we

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iraqi Journal Of Physics
Blood Vessels Detection of Diabetic Retinopathy from Retinal Fundus Image using Image Processing Techniques
...Show More Authors

 

Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from

... Show More
View Publication Preview PDF
Crossref (1)
Crossref