Preferred Language
Articles
/
jih-1425
Image Steganalysis Using Image Quality Metrics (Structural Contents Metric)
...Show More Authors

A new method presented in this work to detect the existence of hidden

data as a secret message in images. This method must be applyied only on images which have the same visible properties (similar in perspective) where the human eyes cannot detect the difference between them.

This method is based on Image Quality Metrics (Structural Contents

Metric), which means the comparison between the original images and stego images, and determines the size ofthe hidden data. We applied the method to four different images, we detect by this method the hidden data and  find exactly the same size of the hidden data.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
The composition of the fragmentary image of the actor's performance in the Iraqi theatrical show
...Show More Authors

The theatrical image represents one of the tools of communication with the other to create a communicative language that is produced and transmitted by the actor and his body through the theatrical space to convey the meaning in all its forms and types. The actor is concerned with the composition and construction of these images. My girl, the image is fragmented and multiple and different. Therefore, based on the foregoing, the researcher has divided his research into four chapters, representing the (methodological framework). First, the research problem, which is manifested in the following question (what is the structure of the fragmented image of the actor's performance? The Iraqi playwright), and secondly: the importance of the resea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
...Show More Authors

     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
An Improve Image Encryption Algorithm Based on Multi-level of Chaotic Maps and Lagrange Interpolation
...Show More Authors

Currently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has become one of the important fields in the protection of digital information.
This paper adopts a new image encryption method to overcome the obstacles to previous image encryption methods, where our method will be used Duffing map to shuffled all image pixels ,after that the resulting image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.
Finally, an image called key image was created by using Quadratic number spirals which will be used to generate nu

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
The preoccupation of mental image in the designs of internal spaces (cinema) is a model
...Show More Authors

The design studies, especially in their contemporary stages, have not been isolated from the subjects that underpin advanced ideas in the field of technical treatments that enrich and improve the social life of users through those technological innovations that have enhanced and changed life styles, Especially in the field of general institutional techniques, including cinemas, as the ideal places for people and visitors to this space, which can contribute to the promotion of cultural, social and technical aspects within this millennium. DONC as reflected on the positive communication and communication between the intellectual and cognitive develop individuals, including cultural and technical side of the individual. The first chapter co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Some New Fixed Point Theorems in Weak Partial Metric Spaces
...Show More Authors

The main objective of this work is to introduce and investigate fixed point (F. p) theorems for maps that satisfy contractive conditions in weak partial metric spaces (W.P.M.S), and give some new generalization of the fixed point theorems of Mathews and Heckmann. Our results extend, and unify a multitude of (F. p) theorems and generalize some results in (W.P.M.S). An example is given as an illustration of our results.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Fixed Point Theorems in General Metric Space with an Application
...Show More Authors

   This paper aims to prove an existence theorem for Voltera-type equation in a generalized G- metric space, called the -metric space, where the fixed-point theorem in - metric space is discussed and its application.  First, a new contraction of Hardy-Rogess type is presented and also then fixed point theorem is established for these contractions in the setup of -metric spaces. As application, an existence result for Voltera integral equation is obtained.  

View Publication Preview PDF
Scopus (12)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
The Image of the man in the series "The Cart and the Rain" by the storyteller (Badia Amin): The Image of the man in the series "The Cart and the Rain" by the storyteller (Badia Amin)
...Show More Authors

Abstract:

The research aims to monitor the image of the man in the group (The Cart and the Rain) by the storyteller (Badiaa Amin); With the aim of highlighting an aspect of feminist writing, especially with regard to the relationship of women to men, and determining the form adopted by the storyteller in drawing the features of men.

The research used the descriptive-analytical method in the space of its textual formation, which aims to stand on the text and deconstruct its narrative significance. To provide a comprehensive picture of it.

Three images of the man appeared in the group's stories, represented by (the authoritarian, the negative, and the positive), and the image of the authoritarian ma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Performance Series Performance Metrics (*) A case study in the General Company for Cotton Industries
...Show More Authors

The problem of the research is focused on importance limited of Iraq industrial companies in application of scientific measurements of supply chains performance,  The research sought to achieve a group of goals, the most important are , identifying the strengths and weaknesses in the reality of supply chain in General Company for Cotton Industries, The data and information required are gathered from the dependence company, records through the field observations and personal interviews, the research used some quantitative indicators to measure of supply chain performance, The research reached to many conclusions , the most outstanding among them is the existence of a strong inverse correlatio

... Show More
View Publication Preview PDF
Crossref