In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are
... Show MoreExamining and comparing the image quality of degenerative cervical spine diseases through the application of three MRI sequences; the Two-Dimension T2 Weighed Turbo Spin Echo (2D T2W TSE), the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE), and the T2 Turbo Field Echo (T2_TFE). Thirty-three patients who were diagnosed as having degenerative cervical spine diseases were involved in this study. Their age range was 40-60 years old. The images were produced via a 1.5 Tesla MRI device using (2D T2W TSE, 3D T2W TSE, and T2_TFE) sequences in the sagittal plane. The image quality was examined by objective and subjective assessments. The MRI image characteristics of the cervical spines (C4-C5, C5-C6, C6-C7) showed significant difference
... Show MoreThis research had been achieved to identify the image of the subsurface structure representing the Tertiary period in the Galabat Field northeast of Iraq using 2D seismic survey measurements. Synthetic seismograms of the Galabat-3 well were generated in order to identify and pick the reflectors in seismic sections. Structural Images were drawn in the time domain and then converted to the depth domain by using average velocities. Structurally, seismic sections illustrate these reflectors are affected by two reverse faults affected on the Jeribe Formation and the layers below with the increase in the density of the reverse faults in the northern division. The structural maps show Galabat field, which consists of longitudinal Asymmetrical narr
... Show MoreFor poets to pay a great attention to the Islamic figures and their symbolism in Islam come as a prominent phenomenon in our literature . As there is an impact of them on the brilliant history commemorated by littérateurs . As a matter of fact ، the chronicle of Imam Ali Ibin Abi Talib (peace be upon him) falls in the orbit of the focus Ibn Abi Al-Hadid Al-Mu'tazili steers to in his poems . The current research study is to trace the portrayal of Imam Ali (peace be upon them) in the poetry of Ibn Abi Al-Hadid Al-Mu'tazili ، Seventh Alwiite Poems ، as there is no a study tacking such a conjecture before. In the article there are two axes : the introduction comes as first axis portraying Imam Ali Ibn Abi Talib (peace be upon him) in the wa
... Show MoreWA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح
... Show MoreThis article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th
... Show MoreSeveral studies have indicated an unprecedented increase in the number of Arab youth who watch music videos. It is also a custom in Arab countries to broadcast songs at their happy parties such as weddings, engagements and birthdays. We see that guests and party owners interact by dancing and singing with the songs, while the viewership rates of Arab music videos have reached millions on YouTube. The researcher decided to study the image of women through the lyrics of these songs, due to their importance in shaping the image of women in the minds of young people and shaping the (self-image) of young women. Twenty songs were selected from the most watched songs on YouTube for the year 2024, and it was found that the negative qualities of t
... Show MoreDiscussed the research variables are important, privatization options and strategic analysis of the external environment, and that the purpose of the research is the trade-off between privatization options and choose the most appropriate alternative in proportion to the external environment, the research aims to determine the privatization the most appropriate option for companies and public contracting, showing the importance of the study provide the privatization of public companies as a strategy can all its way public sector organizations from the transfer of work practices or private sector organizations and mechanisms to it as contributing to improving the level of skills Develop the current and future level of performance,
... Show MoreThe research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features that are attributable to them and their relationships with men and their interests and tendencies , activities and ways and methods pursued to achieve their goals , or what appeared to be trying to achieve and whether made movies vivid and varied models for women, or confined to a rigid model and duplicate Is films raised issues concerning women? The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features th
... Show More