Preferred Language
Articles
/
kxfQPo8BVTCNdQwCmWU6
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.

Publication Date
Thu Jan 02 2014
Journal Name
Sino Us
“Actual Experience”: Correcting Misconceptions Through Analyzing Harriet Wilson’s Our Nig
...Show More Authors

African-American writers during the 19th century wrote in the shadow of the prominent romance, sentimental, and domestic fiction. Harriet Wilson’s Our Nig (1859) reflects an “alternative social character”, for the female protagonist suffers racism in the free North, because she is a mulatto child. Through depicting the life of free blacks, who supposedly lives a better life than Southern slaves, Wilson exposes how she has actually lived and sensed life in antebellum America. According to Raymond Williams (2011), there are two kinds of literary writings. The first represents the general tendency of the age, and he calls it “dominant social character”; representing the majority content of both the public writing and speaking. But, a

... Show More
View Publication
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
Enhancement In Ballistic Performance Of Composite Armor Through Nano Ceramic
...Show More Authors

In this study, industrial fiber and polymer mixtures were used for high-speed impact (ballistic) applications where the effects of polymer (epoxy), polymeric
mixture (epoxy + unsaturated polyester), synthetic rubber (polyurethane), Kevlar fiber, polyethylene fiber (ultra High molecular weight) and carbon fiber.
Four successive systems of samples were prepared. the first system component made of (epoxy and 2% graphene and 20 layer of fiber), then ballistic test was
applied, the sample was successful in the test from a distance of 7 m. or more than, by using a pistol personally Glock, Caliber of 9 * 19 mm. The second
system was consisting of (epoxy, 2% graphene, 36 layers of fiber and one layer of hard rubber), it was succeeded

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
Function of Urban Space in strengthen social interaction through Time
...Show More Authors

problem of the research is the decline of the role of urban space with time as an influential system in societal relations. The research aims to define indicators for achieving social interaction in the city, and to determine indicators for achieving integration in the urban space, and to study the relationship between the integration of urban space and community interaction over time. the research assumed that by distinguishing the social interaction space from the urban space and developing urban spaces in order to be truly interactive spaces, this will help us achieve social interaction and build a positive relationship between them, which enables us to achieve integration within the urban spaces leading to social interaction. Because

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
The jurisprudence of Imam Yahya bin Moin through his history
...Show More Authors

Jurisprudential rulings were not once restricted to anyone. Even if some prominent imams were famous in one science, this does not mean that some of them were not very knowledgeable and well versed in another science, but he did not know much about it, given his fame in the first science in which he emerged. It prevailed over him until he became known only through him, and there are a large number of these people, and among them is our imam, the great critic Yahya bin Ma’in, may God be pleased with him. Many people, and even scholars, know about him except that he is the only imam in jarh and ta’deel, and on his words and the words of his strike are relied upon. In terms of the authenticity and weakness of the hadith, he is in this f

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Jurisprudence of Imam women through Susan Book of blood money
...Show More Authors

Jurisprudence of Imam women through Susan Book of blood money

View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Importance of Strategic Orientation Dimensions in the Iraqi National Security Service: An Analytical Study
...Show More Authors

The current research aims to identify the level of strategic orientation and its dimensions (vision, mission, goals, and values) in the Iraqi National Security Service (INSS). The researchers followed the descriptive analytical approach as one of the forms of analysis and organized scientific interpretation to describe a specific phenomenon or problem, adopting the form questionnaire being the main source in collecting data and preparing for this. Based on the program of the Statistical Package of Social Sciences (SPSS 26) to analyze the data and come up with the final research results to identify the opinions of the intended sample on the subject of research, and the questionnaire of (20) paragraphs included the search variable, and was

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Evaluation the Safety and Security Procedures used In X-ray Clinics in Al-Harthiya-Baghdad
...Show More Authors
Abstract<p>Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The use of water resources in light of the challenges of water security in Iraq
...Show More Authors

Iraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall.  This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More