Preferred Language
Articles
/
jih-1073
Digital Watermarking in Color Image Based On Joint Between DCT and DWT
...Show More Authors

The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by applying DCT transform on the selected sub band's coefficients, this method focuses on the invisibility for the embedded watermark bits, and the quality for the watermarked image; furthermore it focuses on a subjective for the recovered watermark after extraction stage. The proposed method was evaluated by using simple image quality matrix illustrated in the results, and it was found that the proposed method provide good objective quality, the recovered watermark extracted successfully and the quality of recovered watermark are survived.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Proposed Hybrid Technique in Cryptanalysis of Cryptosystem Based on PSO and SA
...Show More Authors

     Modern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.

     This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 28 2023
Journal Name
Al–bahith Al–a'alami
Digital Interactive Elements in The Twitter Platform: An Analytical Study
...Show More Authors

The primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, thes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The effectiveness of artificial intelligence in contemporary digital graphic design
...Show More Authors

In our world, technological development has become inherent in all walks of life and is characterized by its speed in performance and uses. This development required the emergence of new technologies that represent a future revolution for a fourth industrial revolution in various fields, which contributed to finding many alternatives and innovative technical solutions that shortened time and space in terms of making Machines are smarter, more accurate, and faster in accomplishing the tasks intended for them, and we find the emergence of what is called artificial intelligence (artificial intelligence), which is the technology of the future, which is one of the most important outputs of the fourth industrial revolution, and artificial inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of digital finance in improving and enhancing financial inclusion: An applied research in the Iraqi banking system
...Show More Authors

The research seeks to highlight the importance of digital finance in banking by providing financial and banking services and its role in improving the access of financial services to customers at the farthest possible point by using modern technology to finance their needs by granting them cash credits through electronic payment tools to facilitate them and shorten time and effort as well as Low cost, and this cannot be achieved without concerted efforts and the provision of basic infrastructure that includes connecting the Internet to all targeted areas, whether cities or rural areas, as well as distributing the largest possible number of ATMs and sending specialized teams to those areas that develop in customers the culture of digital

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of the Number of Gaussian Points and Their Distribution on Image Quality
...Show More Authors

This  research  involves  studying  the  influence  of  increasing  the

number of Gaussian points and the style of their distribution, on a circular exit pupil, on the numerical calculations accuracy of the point spread function for an ideal optical system and another system having focus error of (0.25 A. and 0.5 A. )

It was shown that the accuracy of the results depends on the type of

distributing points on the exit pupil. Also, the accuracy increases with the increase of the number of points (N) and the increase of aberrations which requires on increas (N).

View Publication Preview PDF
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparison Study Demosaicking of Bayer Color Filter Array
...Show More Authors

Image capturing in most still and  motion  digital  cameras  employs a charge  coupled  device  covered  with  a monolithic array  of color  filters such   that   each   pixel   samples  only   one  color   band.   Interpolation   is necessary   to  restore  the  missing  color  samples  in the  resulting mosaic, this process referred  to as demosaicking.

This  paper   gives  an  overview   of  demosaicking,  presents  few

methods   proposed   in  the &nbsp

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
color methodology to Re-reading the musical notes
...Show More Authors

many painters tried to mix colors with Music by direct employment through colorful musical pieces or the use of multiple instruments and techniques , or vice versa, including the French artist )Robert Stroben(, he transferred the piece of music to be depicted on the painting and worked on the tones of music (Johann Sebastian Bach) by dropping the color on the lines of the musical scale, for example (the C tone) ranging from brown to red ( Tone La A) from gray to orange, and so on, the presence of links and similarity factors between the world of music and the world of colors facilitated the process of linking musical notes with colors, the most famous of which was presented by the world (Newton) in the circle of basic colors and linking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Color Removal from Waste Water by Chemical Coagulation
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Modified Advanced Encryption Standard for Color Images
...Show More Authors

     The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.

In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of Auditing Quality on the Earnings Quality: (An applied research in a sample of private joint stock companies listed on the Iraq Stock Exchange)
...Show More Authors

The research aims to measure the impact of the quality of the audit on the Earnings Quality, for a sample of private joint stock companies listed on the Iraq Stock Exchange, as the research sample included (14) private and listed joint stock companies in issuing their financial statements for the period from (2010-2018), as well as companies The audit offices in charge of auditing these companies, which number (18) companies or an audit office, and the research relied on two main models for measurement, as the first model reflects the assumed relationship between independent variables represented in the characteristics of external audit quality and measuring the extent of its impact on the dependent variable represented in the Ea

... Show More
View Publication Preview PDF