Preferred Language
Articles
/
jih-2365
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of confidential data. This paper presents a steganography method in frequency domain. Haar Wavelet Transform is applied for decomposition of gray level cover image into four sub-bands. The secret image is hidden in the high frequency HH sub-band after applying the histogram modification followed by scrambling process. A Histogram modification is adopted, to scale the secret image to normalize its values, that manipulates the secret image from bright image to dark. Thus the secret image becomes invisible so it can be hidden in the high frequency sub-band.  Scrambling the positions can be for rows then columns, which will give strong security of the hiding process. The experimental results demonstrate the proposed method has achieved superior performance in terms of quantifiable measurement (PSNR and correlation) and in terms of visual quality. The proposed method propositions good imperceptible results and good response for against the various image attacks.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF
Publication Date
Sun Dec 22 2024
Journal Name
Al–bahith Al–a'alami
THE EFFECT OF FASHIONISTA ON FEMALE BODY IMAGE
...Show More Authors

The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
The Use of Wavelet, DCT & Quadtree for Images Color Compression
...Show More Authors

The need for image compression is always renewed because of its importance in reducing the volume of data; which in turn will be stored in less space and transferred more quickly though the communication channels.
In this paper a low cost color image lossy color image compression is introduced. The RGB image data is transformed to YUV color space, then the chromatic bands U & V are down-sampled using dissemination step. The bi-orthogonal wavelet transform is used to decompose each color sub band, separately. Then, the Discrete Cosine Transform (DCT) is used to encode the Low-Low (LL) sub band. The other wavelet sub bands are coded using scalar Quantization. Also, the quad tree coding process was applied on the outcomes of DCT and

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Robust Estimation OF The Partial Regression Model Using Wavelet Thresholding
...Show More Authors

            Semi-parametric regression models have been studied in a variety of applications and scientific fields due to their high flexibility in dealing with data that has problems, as they are characterized by the ease of interpretation of the parameter part while retaining the flexibility of the non-parametric part. The response variable or explanatory variables can have outliers, and the OLS approach have the sensitivity to outliers. To address this issue, robust (resistance) methods were used, which are less sensitive in the presence of outlier values in the data. This study aims to estimate the partial regression model using the robust estimation method with the wavel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Estimation of nonparametric regression function using shrinkage wavelet and different mother functions
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
MODIFICATION OF TUBULARIZED INCISED PLATE URETHROPLASTY IN HYPOSPADIUS REPAIR FOR PREVENTING FISTULA AND MEATAL STENOSIS.
...Show More Authors

Objective: to evaluate the benefit of coverage of
the urethral repair by dorsal dartos flap as a second
layer for preventing fistula and V like incision on
the tip of the glans for preventing meatal stenosis.
Patients and Methods:
Forty five children included in this study age
ranged ( 11 months – 7 years), they underwent
hypospadias repair between December 2008 to
March 2012, all cases with distal hypospadias,
same technique used for all patients, a combination
of techniques used for reconstruction starting
withtubularized incised plate urethroplasty with deepithelialized
or stripping of the skin from both
sides of U shaped incision surrounding the urethral
plate, adding a V like incision on t

... Show More
View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 10 2022
Journal Name
Pakistan Journal Of Statistics And Operation Research
Continuous wavelet estimation for multivariate fractional Brownian motion
...Show More Authors

 In this paper, we propose a method using continuous wavelets to study the multivariate fractional Brownian motion through the deviations of the transformed random process to find an efficient estimate of Hurst exponent using eigenvalue regression of the covariance matrix. The results of simulations experiments shown that the performance of the proposed estimator was efficient in bias but the variance get increase as signal change from short to long memory the MASE increase relatively. The estimation process was made by calculating the eigenvalues for the variance-covariance matrix of Meyer’s continuous wavelet details coefficients.

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Sep 10 2022
Journal Name
Pakistan Journal Of Statistics And Operation Research
Continuous wavelet estimation for multivariate fractional Brownian motion
...Show More Authors

 In this paper, we propose a method using continuous wavelets to study the multivariate fractional Brownian motion through the deviations of the transformed random process to find an efficient estimate of Hurst exponent using eigenvalue regression of the covariance matrix. The results of simulations experiments shown that the performance of the proposed estimator was efficient in bias but the variance get increase as signal change from short to long memory the MASE increase relatively. The estimation process was made by calculating the eigenvalues for the variance-covariance matrix of Meyer’s continuous wavelet details coefficients.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2000
Journal Name
Al-rafidain Collage Conference
The Modification of Median Filter to use as noise reduction procedure
...Show More Authors