Preferred Language
Articles
/
whdmNo8BVTCNdQwC9WKw
Efficient text in image hiding method based on LSB method principle

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covered image pixel (after text hiding) was perfectly match the original image pixels through the use of well-known quantify error metrics like rote mean square MSE and signal to noise ratio PSNR measurements. The experimental results are showed in table for various text sizes to the same cover image. Two digital images types (i.e., low and high details) were used in system evaluation.

View Publication
Publication Date
Fri Sep 02 2022
Journal Name
Journal Of Legal Sciences
Principle of lex specialis

The principle running a distinguished position among the general principles of law in international law ,and because it is  one of the  well- established  principle in the national legal systems in the world ,and this justifies the voluntary approach of the principle as an expression of the will of stste, so the principle was under study by the international law commission in the subject of fragmentation as one of the legal methods linking the rules systems of traditional interntional law to maintain its coherence. Thst the  works of the principle by international judiciary between the various international legal standards are in accordance with the concept of jurisprudence with certain conditions and in view of its d

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Mar 21 2023
Journal Name
Biomedical And Pharmacology Journal
Development and Validation of HPLC Method For the Detection of Fusidic Acid Loaded in Non-ionic and Cationic Nanoemulsion-Based Gels

Fusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentrati

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
The principle of citizenship in Shari'a policy

Jurists were unable to comprehend modern terminology and concepts to provide mature answers
On the questions and issues of the age, and what I want to research and raise it; an important and urgent subject, to crystallize the opinion jurisprudence
Islamic, which is the subject of citizenship. The globalization of the concept of citizenship, and the spread of special cultural differences,
The blurring of the identities and specificities of nations due to conflict, or political differences, often results in responses
This trend is inversely rooted and rooted, and as a result, the threat to one's religion or predecessors becomes threatened by one's culture,
Thus destroying the essence of his identity. Man has the highest rank

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Linear Feedback Shift Registers-Based Randomization for Image Steganography

     Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Feb 05 2021
Journal Name
Research In Intelligent And Computing In Engineering
Implementing Web Testing System Depending on Performance Testing Using Load Testing Method.

Web testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t

... Show More
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Gamma Radiation Effect on Characterizations of Gold Nanoparticles Synthesized Using Green Method

      Biocompatible gold nanoparticles were successfully synthesized by hibiscus plant leaf extract as a bioreactor. The prepared nanoparticles were evaluated using UV/Vis spectroscopy, Atomic Force Microscopy (AFM), Fourier Transform Infrared Spectroscopy (FT-IR), X-ray Diffraction and Scanning Electron Microscopy (SEM) . The study also investigated the effect of the different gamma irradiation doses on the size and dispersion of the produced nanoparticles. In UV- Vis spectra, the peak of Au NPs' surface plasmon resonance (SPR) was detected as a single peak at 543 nm. The gamma irradiation induced a blue shift in the SPR peak, which indicates that it might be applied as affective factor for size control.  Physical as well as chemi

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Remediation of Oil Production by Matrix Acidizing Method on an Oil Well

   The remediation oil production by matrix acidizing method on the well named "X" (for confidential reasons) is scrutinized in this paper. Initial production of 1150 bpd, production index of 2.8 STB/Psi/d and permeability of 150md, in 2018 two years down the lane this dropped to 450 bpd, production index 0.7 STB/Psi/d. The declined observed on the production index is trouble shouted and after elimination of (no completion damage/perforation damage), the skin is calculated by carrying out a well test (build-up test) whose extrapolation in excel over times gave us a skin of 40.The reservoir heterogeneity, containing >20% of feldspar, carbonates and paraffin’s guided thematrix acidizing design and treatment proposition to remedy thi

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
Study of Gamma — irradiation effects on the Polymethylmethacrylate (PMMA) Using (PAL) Method

Gamma - irradiation effect on polymethylmethacrylate (PMMA) samples has been studied using Positron Annihilation Lifetime (PAL) method. The orthopositronium (o-Ps) lifetime τ3, hence the o-ps parameters, the volume hole size (Vh) and the free volume fraction (Ꞙh) in the irradiated samples were measured as a function of gamma-irradiation dose up to 28.05 kGy. It has been shown that τ 3, Vh, and Ꞙh, are increasing in general with increasing gamma-dose, to reach a maximum percentage increment of 22.42% in τ3, 60% in Vh and 29.5% in Ꞙh, at. 2.55 kGy, whereas τ2 reaches maximum increment of 119. 7% at 7.65 kGy. The results s

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key

Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref
View Publication Preview PDF