Preferred Language
Articles
/
jih-1433
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Fri Mar 25 2022
Journal Name
Nasaq Journal
A Linguistic Study of Paronomasia (Al-Jinās ) in Arabic and English
...Show More Authors

Paronomasia is a recognized rhetorical device by which poets could play with words that are similar or identical in form but different in meaning. The present study aims to identify paronomasia in Arabic and English. To achieve the aim of the study, a corpus of selected verses chosen from two famous figures in Arabic and English literatures and analyzed thoroughly. The analysis of data under investigation reveals that paronomasia is a crucial aid used by poets to portrait the real world as imaginative. It further shows that the concept of paronomasia in English is not the same as in Arabic. In English, there are echoes of the Arabic jinās, i.e., there are counterpart usages of similar devices, yet English rhetoricians have not defined or c

... Show More
Publication Date
Thu May 30 2019
Journal Name
لارك
Approaches to Lexicography in English and Arabic
...Show More Authors

Lexicography, the art and craft of dictionary-making, is as old as writing. Since its very early stages several thousands of years ago, it has helped to serve basically the every-day needs of written communication among individuals in communities speaking different languages or different varieties of the same language. Two general approaches are distinguished in the craft of dictionary-making: the semasiological and the onomasiological. The former is represented by usually-alphabetical dictionaries as such, i.e. their being inventories of the lexicon, while the latter is manifested in thesauruses. English and Arabic have made use of both approaches in the preparation of their dictionaries, each having a distinct aim ahead. Wit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
A Phonological Study of English and Arabic Assimilation : A Contrastive Study
...Show More Authors

        Assimilation is defined ,by many phoneticians like  Schane ,Roach ,and many others, as a phonological process when there is a change of one sound into another because of  neighboring sounds.This study investigates the  phoneme assimilation as a phonological process in English and Arabic  and it is concerned specifically with the differences and similarities in both languages.   Actually ,this study reflects the different terms which are used  in Arabic to refer to this phenomenon and in this way it  shows whether the term 'assimilation ' can have the same meaning of  'idgham' in Arabic or not . Besides, in Arabic , this phenomenon is discussed from&nb

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (10)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2021
Journal Name
Al-adab Journal
A Feminist Rhetorical Analysis of Anti-feminist Poetry in English and Arabic
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Sep 15 2017
Journal Name
كلية الاداب جامعة بغداد
A Contrastive study of ‘Inversion ‘ in Modern English and Modern Arabic Poetry
...Show More Authors

The present paper respects 'inversion' as a habit of arranging the language of modern English and Arabic poetry . Inversion is a significant phenomenon generally in modern literature and particularly in poetry that it treats poetic text as it is a violator to the ordinary text. The paper displays the common patterns and functions of inversion which are spotted in modern English and Arabic poetry in order to show aspects of similarities and differences in both languages. It concludes that inversion is most commonly used in English and Arabic poetry in which it may both satisfy the demands of sound correspondence and emphasis. English and Arabic poetic languages vary in extant to their manipulation of inverted styles as they show changeable f

... Show More