Preferred Language
Articles
/
jih-3088
Secured Mechanism Towards Integrity of Digital Images Using DWT, DCT, LSB and Watermarking Integrations
...Show More Authors

"Watermarking" is one method in which digital information is buried in a carrier signal;
the hidden information should be related to the carrier signal. There are many different types of
digital watermarking, including traditional watermarking that uses visible media (such as snaps,
images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate
noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital
watermark must be able to withstand changes that can be made to the carrier signal in order to
protect copyright information in media files. The goal of digital watermarking is to ensure the
integrity of data, whereas steganography focuses on making information undetectable to humans.
Watermarking doesn't alter the original digital image, unlike public-key encryption, but rather
creates a new one with embedded secured aspects for integrity. There are no residual effects of
encryption on decrypted documents. This work focuses on strong digital image watermarking
algorithms for copyright protection purposes. Watermarks of various sorts and uses were
discussed, as well as a review of current watermarking techniques and assaults. The project shows
how to watermark an image in the frequency domain using DCT and DWT, as well as in the spatial
domain using the LSB approach. When it comes to noise and compression, frequency-domain
approaches are far more resilient than LSB. All of these scenarios necessitate the use of the original
picture to remove the watermark. Out of the three, the DWT approach has provided the best results.
We can improve the resilience of our watermark while having little to no extra influence on image
quality by embedding watermarks in these places. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (10)
Scopus
Publication Date
Thu Jun 10 2021
Journal Name
Neuroquantology
Atmospheric Emissions Effects and Mechanism
...Show More Authors

Humanity's relationship with the environment is a delicate balance. Since the industrial revolution, the world's population has grown at an exponential rate, and this has a major environmental effect. Deforestation, pollution, and global climate change are just a few of the negative consequences of population and technological growth. Particulates, Sulphur dioxide (SO2), and nitrogen oxides (NOx) are the primary pollutants that harm our health. These contaminants may be directly emitted into the atmosphere (primary pollutants) or formed in the atmosphere from primary pollutants reacting (secondary pollutants. Tropospheric ozone is created When water reacts with volatile organic compounds (VOC) and nitrogen oxides (NOx) in the presen

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key
...Show More Authors

Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Mon Dec 16 2024
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

The research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Hybrid Images Compression and Transmitted Using MC-CDMA System
...Show More Authors

In this paper, the combined source coding with Multi Carrier Code Division Multiple Access (MC-CDMA) system is proposed, where the transmission of the compressed image produced from source coding through Additive White Gaussian Noise (AWGN) channel for a single user and multi users. In which the (MC-CDMA) system removes Inter Symbol Interference (ISI) and Inter Carrier Interference (ICI). The hybrid compression system of Discrete Cosine Transform (DCT) and predictive coding (PC) technique are integrated as a source coding. The simulation results indicates that the transmission system of a single user was much better than the transmission system of multi users. When the number of users increased, the Bit Error Rate (BER) increased. For a

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Automatic Block Selection for Synthesizing Texture Images using Genetic Algorithms
...Show More Authors

Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Engineering
Mechanical Integrity of Printed Circuit Heat Exchanger
...Show More Authors

The printed circuit heat exchanger is a plate type heat exchanger with a high performance and compact size. Heat exchangers such as this need a unique form of bonding and other techniques to be used in their construction. In this study, the process of joining plates, diffusion bonding, was performed and studied. A special furnace was manufactured for bonding purposes. The bonding process of copper metal was carried out under specific conditions of a high temperature up to 700 oC, high pressure of 3.45 MPa, and in an inert environment (Argon gas) to make tensile samples. The tensile samples are cylindrical shapes containing groves representing the flow channels in the printed circuit heat exchanger and checking their tensile st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Survey on Blind De-Blurring of Digital Image
...Show More Authors

      Nowadays, huge digital images are used and transferred via the Internet. It has been the primary source of information in several domains in recent years. Blur image is one of the most common difficult challenges in image processing, which is caused via object movement or a camera shake. De-blurring is the main process to restore the sharp original image, so many techniques have been proposed, and a large number of research papers have been published to remove blurring from the image. This paper presented a review for the recent papers related to de-blurring published in the recent years (2017-2020). This paper focused on discussing various strategies related to enhancing the software's for image de-blur.&n

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref