Preferred Language
Articles
/
whdmNo8BVTCNdQwC9WKw
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covered image pixel (after text hiding) was perfectly match the original image pixels through the use of well-known quantify error metrics like rote mean square MSE and signal to noise ratio PSNR measurements. The experimental results are showed in table for various text sizes to the same cover image. Two digital images types (i.e., low and high details) were used in system evaluation.

View Publication
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Automated method for buried object detecting using ground penetrating radar (GPR) survey
...Show More Authors

  Ground Penetrating Radar (GPR) is a nondestructive geophysical technique that uses electromagnetic waves to evaluate subsurface information. A GPR unit emits a short pulse of electromagnetic energy and is able to determine the presence or absence of a target by examining the reflected energy from that pulse. GPR is geophysical approach that use band of the radio spectrum. In this research the function of GPR has been summarized as survey different buried objects such as (Iron, Plastic(PVC), Aluminum) in specified depth about (0.5m) using antenna of 250 MHZ, the response of the each object can be recognized as its shapes, this recognition have been performed using image processi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Research In Applied Linguistics
Flouting of Cooperative Principle in Jane Austen's Pride and Prejudice
...Show More Authors

DBN Rashid, Astra Salvensis, 2018 - Cited by 1

View Publication
Publication Date
Thu Oct 18 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
Breaching the Cooperative Principle Theory in English and Russian One Act Plays
...Show More Authors

PDBNRSIA Asst, International Journal of Research in Social Sciences and Humanities, 2018

View Publication
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Intelligent Engineering And Systems
Automatic Computer Aided Diagnostic for COVID-19 Based on Chest X-Ray Image and Particle Swarm Intelligence
...Show More Authors

View Publication
Scopus (24)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of Oil from Eucalyptus Camadulensis Using Water Distillation Method
...Show More Authors

This work was conducted to study the extraction of eucalyptus oil from natural plants (Eucalyptus camaldulensis leaves) using water distillation method by Clevenger apparatus. The effects of main operating parameters were studied: time to reach equilibrium, temperature (70 to100°C), solvent to solid ratio (4:1 to 8:1 (v/w)), agitation speed (0 to 900 rpm), and particle size (0.5 to 2.5 cm) of the fresh leaves, to find the best processing conditions for achieving maximum oil yield. The results showed that the agitation speed of 900 rpm, temperature 100° C, with solvent to solid ratio 5:1 (v/w) of particle size 0.5 cm for 160 minute give the highest percentage of oil (46.25 wt.%). The extracted oil was examined by HPLC.

View Publication Preview PDF
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
The Modified Quadrature Method for solving Volterra Linear Integral Equations
...Show More Authors

In this paper the modified trapezoidal rule is presented for solving Volterra linear Integral Equations (V.I.E) of the second kind and we noticed that this procedure is effective in solving the equations. Two examples are given with their comparison tables to answer the validity of the procedure.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Ain Shams Engineering Journal
A semi-analytical iterative method for solving differential algebraic equations
...Show More Authors

View Publication
Crossref (9)
Crossref