Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key, secondly selected the block number and slice number, thirdly, the low-high band used for embedding after adding the generated number, fourthly, used the Hessenberg transform on the blocks that portioned the band (low-high) in a specific size. The secret information (image or text) is a binary value. It was embedded by setting the positive value in the diagonal to odd values if the embedded is one and setting it to even if the secret bit is zero. Several tests were applied, such as applying mean square error, peak signal to noise ratio PSNR, and structural similarity index measure SSIM. Some analyses such as adding noise, scaling, and rotation analysis are applied to test the efficiency. The results of the tests showed the strength of the proposed method.
Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThis research a mining at evaluation the efficiency of the nursing performance depended on standards of W.H.O. via application standards of W.H.O on the nursing personnel in medical city office, in light of it, it has design world evaluation list, and a sample was chosen from the nursing personnel in given researched the organization whom they are evaluated according to the standards of W.H.O for the nursing performance included of ten standards, divided in to 45 question , besides the evaluation list, the researcher get assistance of some tools of collection information via actual checking and personal interviews, a number of statistical means were used to manipulate t
... Show MoreAbstract
The research problem focuses on studying the interest of the Medical City Department of the Ministry of Health in improving the creative thinking skills of the administrative leadership through parallel & comprehensive thinking according to the of six thinking hats strategy. The research sample consisted of (170) administrative leaders in the upper & middle organizational levels, The questionnaire was used as a main tool for data collection, In addition to the observation & Interview, The research sought to answer the following questions: What is the extent to which the administrative leadership (Tpp & middle) in the organization investigated the concept of the six thinkin
... Show MoreSurgical site infections are the second most common type of adverse events occurring in hospitalized patients. Surgical antibiotic prophylaxis refers to the use of preoperative and postoperative antibiotics to decrease the incidence of postoperative wound infections. The objective of this study was to evaluate the antibiotic administration pattern for surgical antibiotic prophylaxis and the adherence to American Society of Health-System Pharmacists surgical antibiotic prophylaxis guideline in Medical City Teaching Hospitals/Baghdad. The medical records of one hundred patients who underwent elective surgical procedures were reviewed. Adherence to the recommendations of American society of health‑system pharmacists guideline was ass
... Show More