Preferred Language
Articles
/
yhY5mYcBVTCNdQwCGFen
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.

Scopus Crossref
Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
Analysis Of Elements Of The Iranian Story In The Story Of Rustom And Suhrab - A Stylistic Study: بررسی عناصر قصه ایرانی در داستان رستم و سهراب، با رویکرد سبک‌گرایی
...Show More Authors

Iranian stories have been one of the most important aspects   of Iranian society's culture and have reflected us as a mirror of all its cultural, societal and political dimensions.Among the important elements of the story can be the creation of space and the movement and the creation of characters and conflict and content and the angle of vision and landscape, language and subject. Studying the elements of the story leads to more understanding and determining the strength and skill of the author by studying the elements of his story. The story of Rustom and Suhrab is also one of the many stories in which the elements of the story are often noticed and show the skill of the great professor Al-Fardousi to benefit from these eleme

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Elastic electron scattering from 17Ne and 27P exotic nuclei
...Show More Authors

The ground state proton, neutron and matter densities and
corresponding root mean square radii of unstable proton-rich 17Ne
and 27P exotic nuclei are studied via the framework of the twofrequency
shell model. The single particle harmonic oscillator wave
functions are used in this model with two different oscillator size
parameters core b and halo , b the former for the core (inner) orbits
whereas the latter for the halo (outer) orbits. Shell model calculations
for core nucleons and for outer (halo) nucleons in exotic nuclei are
performed individually via the computer code OXBASH. Halo
structure of 17Ne and 27P nuclei is confirmed. It is found that the
structure of 17Ne and 27P nuclei have 2
5 / 2 (1d ) an

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Rough continuity and rough separation axioms in G<inf>m</inf>-closure approximation spaces
...Show More Authors

The theory of general topology view for continuous mappings is general version and is applied for topological graph theory. Separation axioms can be regard as tools for distinguishing objects in information systems. Rough theory is one of map the topology to uncertainty. The aim of this work is to presented graph, continuity, separation properties and rough set to put a new approaches for uncertainty. For the introduce of various levels of approximations, we introduce several levels of continuity and separation axioms on graphs in Gm-closure approximation spaces.

Preview PDF
Scopus Clarivate
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Efficient Single Stage Shrinkage Estimator for the Scale parameter of Inverted Gamma Distribution
...Show More Authors

 The present  paper agrees  with estimation of scale parameter θ of the Inverted Gamma (IG) Distribution when the shape parameter α is known (α=1), bypreliminarytestsinglestage shrinkage estimators using  suitable  shrinkage weight factor and region.  The expressions for the Bias, Mean Squared Error [MSE] for the proposed estimators are derived. Comparisons between the considered estimator with the usual estimator (MLE) and with the existing estimator  are performed .The results are presented in attached tables.

View Publication Preview PDF
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Improvement the Mechanical Characteristics of Alloy Steel DIN 41Cr4 by Shot Peening
...Show More Authors

The effects of shot peening treatment (SPT) were studied at (10,20, and 30) minutes on the rotating bending fatigue behavior and the behavior of the alloy steel DIN 41Cr4 vibrations. The hardness test, tensile test, constant amplitude fatigue tests, and the vibration measurements were performed on samples with and without cracks at room temperature (RT), also, the fracture surface was examined and analyzed by a Scanning Electron Microscope (SEM). The results of the investigations, for example, Stress to Number of cycles to failure (S-N) curves, fatigue strength improvement factor of 5% to 10%, the decreasing percentage of maximum Fast Fourier Transform (FFT) acceleration of the shot-peened condition were compared to untr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Fully Prime Semimodule, Fully Essential Semimodule and Semi-Complement Subsemimodules
...Show More Authors

      The concept of semi-essential semimodule has been studied by many researchers.

     In this paper, we will develop these results by setting appropriate conditions, and defining new properties, relating to our concept, for example (fully prime semimodule, fully essential semimodule and semi-complement subsemimodule) such that: if for each subsemimodule of -semimodule  is prime, then  is fully prime. If every semi-essential subsemimodule of -semimodule  is essential then  is fully essential. Finally, a prime subsemimodule  of  is called semi-relative intersection complement (briefly, semi-complement) of subsemimodule  in , if , and whenever  with  is a prime subsemimodule in , , then .  Furthermore, some res

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Nearly Pseudo Quasi-2-Absorbing submodules(I)
...Show More Authors

The concept of a 2-Absorbing submodule is considered as an essential feature in the field of module theory and has many generalizations. This articale discusses the concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules and their relationship to the 2-Absorbing submodule, Quasi-2-Absorbing submodule, Nearly-2-Absorbing submodule, Pseudo-2-Absorbing submodule, and the rest of the other concepts previously studied. The relationship between them has been studied, explaining that the opposite is not true and that under certain conditions the opposite becomes true. This article aims to study this concept and gives the most important propositions, characterizations, remarks, examples, lemmas, and observations related to it. In the en

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Some Geometric Properties for a Certain Class of Meromorphic Univalent Functions by Differential Operator
...Show More Authors

The major target of this paper is to study a confirmed class of meromorphic univalent functions . We procure several results, such as those related to coefficient estimates, distortion and growth theorem, radii of starlikeness, and convexity for this class, n additionto hadamard product, convex combination, closure theorem, integral operators, and  neighborhoods.

View Publication Preview PDF
Scopus Crossref