Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key, secondly selected the block number and slice number, thirdly, the low-high band used for embedding after adding the generated number, fourthly, used the Hessenberg transform on the blocks that portioned the band (low-high) in a specific size. The secret information (image or text) is a binary value. It was embedded by setting the positive value in the diagonal to odd values if the embedded is one and setting it to even if the secret bit is zero. Several tests were applied, such as applying mean square error, peak signal to noise ratio PSNR, and structural similarity index measure SSIM. Some analyses such as adding noise, scaling, and rotation analysis are applied to test the efficiency. The results of the tests showed the strength of the proposed method.
Background: Depression, a state of low mood and aversion to activity, can affect people's thoughts, behavior, tendencies, feelings, and sense of well-being. It can either be short-term or long-term, depending on the severity of the person's condition. Risk factors include personal or family history of depression, major life changes, trauma, stress, certain physical illnesses, and medications.
Objective: This study investigates the prevalence of depression among medical students at the University of Baghdad, college of medicine in Iraq, and the association between some variables and depression.
Subjects and Methods: A cross-sectional study design with a convenience sampling method was conducted.
... Show MoreOn Saturday, May 13, 2023, a glorious day was engraved in the history of Al-Kindy College Medical Journal as it is the day of indexing the journal in the Scopus Database Journals. The journal has paced a strenuous journey to make that achievement.
Burn is one of the most devastating traumas that someone can encounter in their life. Burn wound sepsis is still the leading cause of death in burned patients. Appropriate knowledge of the causative pathogen in burn sepsis is important for successful patient management and for the reduction of the incidence of antibiotic resistance. A retrospective study was conducted between 2010 and 2018 at the Burn Specialty Hospital in Baghdad.Atotal of 320 blood culture samples were obtained from patients with sepsis orsuspected of having sepsis. Patient age ranged between 9 months to 70 years old, with a mean total burn surface area of 45.26%. The most common microorganisms isolated from those patients who had sepsis or suspicion of sepsis were Klebsi
... Show MoreBackground: The study was designed for the assessment of the knowledge of medical students regarding pandemics. In the current designed study, the level of awareness was checked and the majority of students were found aware of SARS-CoV and SARS-Cov2 (Covid-19).
Objective: To assess the awareness of SARS-CoV and SARS-Cov2 (Covid-19) among medical students of Pakistan.
Subjects and Methods: A cross-sectional survey was carried out in different universities of Pakistan from May to August 2020. A self-constructed questionnaire by Pursuing the clinical and community administration of COVID-19 given by the National Health Commission of the People's Republic of China was used am
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreThis paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show MoreThis work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera
... Show More