Preferred Language
Articles
/
oxdAFY4BVTCNdQwCyzER
Streaming video content over NGA (next generation access) network technology‏

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.

Publication Date
Sun Sep 01 2024
Journal Name
Baghdad Science Journal
Some Results about Acts over Monoid and Bounded Linear Operators

 الأثر V بالنسبة إلى   sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي

... Show More
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Experimental Investigation of a Laser Wireless Video Communication System Using Intensity Modulated /Direct Detection Technique

In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.

View Publication Preview PDF
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Video Image Compression Using Absolute Moment Block Truncation Method with Orthogonal Search Motion Estimation Technique

Image compression has become one of the most important applications of the image processing field because of the rapid growth in computer power. The corresponding growth in the multimedia market, and the advent of the World Wide Web, which makes the internet easily accessible for everyone. Since the early 1980, digital image sequence processing has been an attractive research area because an image sequence, as acollection of images, may provide much compression than a single image frame. The increased computational complexity and memory space required for image sequence processing, has in fact, becoming more attainable. this research absolute Moment Block Truncation compression technique which is depend on adopting the good points of oth

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
Enhancement Digital Forensic Approach for Inter-Frame Video Forgery Detection Using a Deep Learning Technique

    The digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th

... Show More
Scopus (8)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Multibiometric System with Runs Bits Permutation for Creating Cryptographic key Generation Technique

    The context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is  now  the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce  identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the  robust system.  In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several man

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Feb 05 2010
Journal Name
Etri Journal
Scopus (42)
Crossref (27)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Sep 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
POWER GENERATION FROM “PRO” PROCESS USING FLAT SHEET TFC–ULP KOCH MEMBRANES

The production of power using the process of pressure–retarded osmosis (PRO) has been studied both experimentally and theoretically for simulated sea water vs. river water and deionized water under two cases: the first is for simulated real conditions of sea water and river water and second under low brine solution concentration to examine the full profile of the power- pressure. The influence of concentration polarization (CP) on water flux has been examined as well.

View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
International Journal Of Engineering And Innovative Technology
White Light Generation by Electroluminescence for ZnO Nanoparticle –Organic Hybrid Junction Device

ZnO organic hybrid junction (electroluminescence EL device) was fabricated using phase segregation method. ZnO-nanoparticle (NPs) was prepared as a colloidal by self–assembly method of Zinc acetate solution with KOH solution. Nanoparticle is employed to form organic-inorganic hybrid film and generate white light emission, while N,N’–diphenyl-N,N’ –bis(3-methylphenyl)-1,1’-biphenyl 4,4’-diamine (TPD) and polymethyl methacrylate (PMMA) are adopted as the organic matrices. ZnO NPs was used to fabricate TPD: PMMA: ZnO NPs hybrid junction device. The photoluminescence (PL) and electroluminescence (EL) spectra of the TPD: PMMA: ZnO NPs hybrid device provided a broad emission band covering entirely the visible spectrum (∼350-∼700

... Show More
View Publication
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Techniques and Challenges for Generation and Detection Face Morphing Attacks: A Survey

      Face recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of  persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima

... Show More
Scopus (5)
Crossref (2)
Scopus Crossref
View Publication Preview PDF