Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key, secondly selected the block number and slice number, thirdly, the low-high band used for embedding after adding the generated number, fourthly, used the Hessenberg transform on the blocks that portioned the band (low-high) in a specific size. The secret information (image or text) is a binary value. It was embedded by setting the positive value in the diagonal to odd values if the embedded is one and setting it to even if the secret bit is zero. Several tests were applied, such as applying mean square error, peak signal to noise ratio PSNR, and structural similarity index measure SSIM. Some analyses such as adding noise, scaling, and rotation analysis are applied to test the efficiency. The results of the tests showed the strength of the proposed method.
يتناول البحث شخصية شعرية وأدبية فذة هو محمد صالح بحر العلوم الشاعر العراقي المعروف والمولود في بيت ثوري من بيوتات النجف المعادية للاستعمار البريطاني في مطلع القرن العشرين، وينحدر من أسرة عريقة مشهورة بالعلم والأدب، عاش بحر العلوم شاعراً ينقل بصوره الجمالية كل ما يقع في حواسه، وتجربته تثري من اتصاله ببيئته فنجد الشاعر اشبه بالمصور يستمد صوره من واقع بيئته المتنوع. ونحن في بحثنا هذا نحاول أن نرصد أهم المصادر
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe novels that we have addressed in the research, Including those with the ideological and political ideology, It's carry a negative image for the Kurds without any attempt to understand, empathy and the separation between politics and the people, The novels were deformation of the image, Like tongue of the former authority which speaks their ideas, Such as (Freedom heads bagged, Happy sorrows Tuesdays for Jassim Alrassif, and Under the dogs skies for Salah Salah). The rest of novels (Life is a moment for Salam Ibrahim, The country night for Jassim Halawi, The rib for Hameed Aleqabi). These are novels contained a scene carries a negative image among many other social images, some positive, and can be described as neutral novels. We can
... Show MoreThe use of antibiotics without prescription (self-medication) is growing globally and is associated with increased bacterial resistance, ineffective treatment and adverse reactions. This study aimed at assessing the practice of antibiotic self-medication in the Iraqi population. A cross-sectional study design was adopted in this work. The sample was comprised of 303 staff members from the non-medical colleges in Iraq. An online questionnaire was distributed between the 29th of June to the 14th of September 2021 to collect data including socio-demographic characteristics and questions about antibiotic self-medication. Most of the participants had a university degree and a moderate monthly income. The majority (88%) h
... Show MoreThe derivatives formed after the successive acetylation, esterification and nitration reactions to cholic, deoxycholic, and taurocholic acids were identified to be of the following general strucure: Colt, Where RI=NO3, OH, 0=, or CH3COO. R2=H, NO3, OH, 0-=, or CH3COO. R3=H, NO3,01-1, 0=, or CH3COO. R4=OH, NH(CH2)2S03Na, NH(CH2)2S03H, or OMe. By using U.V-visible and I.R spectrophotometry . The number of hydroxyl groups was determined, purity was checked from T.L.C, Most of these derivatives will find pharmaceutical application.
The right of the patient to know the medical risks surrounding the medical intervention is one of the most prominent rights based on the principle of "physical safety", which has undergone several stages of development until it reached the development of the patient's independence in making medical decision without relying on the doctor, The patient's prior informed consent is informed of his / her medical condition. We will study this development in accordance with the French March 4, 2002 legislation on the rights of patients in the health system, whether it was earlier and later. We will highlight the development of the patient's right to "know the medical risks surrounding medical intervention" The legislation and its comparison with th
... Show MoreThe main aim of image compression is to reduce the its size to be able for transforming and storage, therefore many methods appeared to compress the image, one of these methods is "Multilayer Perceptron ". Multilayer Perceptron (MLP) method which is artificial neural network based on the Back-Propagation algorithm for compressing the image. In case this algorithm depends upon the number of neurons in the hidden layer only the above mentioned will not be quite enough to reach the desired results, then we have to take into consideration the standards which the compression process depend on to get the best results. We have trained a group of TIFF images with the size of (256*256) in our research, compressed them by using MLP for each
... Show More