Preferred Language
Articles
/
5xZBuIcBVTCNdQwCdF5t
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed user, cannot detect the presence of the secrete data sent. Least Significant Bit (LSB) and Pseudo Random Number Generator (PRGN) are used to hide the secrete data. The Proposed approach is better in PSNR value and Capacity as shown experimentally than existing techniques.

Publication Date
Thu May 15 2025
Journal Name
Route Educational And Social Science Journal
A PSYCHOSOCIAL ANALYSIS OF APPROACHING ZANZIBAR BY TINA HOWE
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Zinc Removal from Industrial Wastewater by Electro-Coagulation Process
...Show More Authors

Electro coagulation treatment was used for zinc removal from electroplating wastewater of the State Company for Electrical Industries . This wastewater, here consists zinc ions with maximum concentration in solution of 90 ppm .

The parameters that influenced the wastewater treatment are: current density in the range  1-1.4 mA/cm2, pH  in the range 5-10, temperature in the range 25-45°C and time in the range 10-180 minute.

The research is a laboratory experimental type using batch system for electrical process with direct current. The cell comprised of aluminum electrode as anode and stainless steel electrode as cathode. Thirty experiments and one hundred fifty sample lab tests were carried out in this research

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Plant Archives
evaluation of soils baghdad governorate pollution by radioactive elements
...Show More Authors

Scopus
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Heat Exchanger Performance by Using Dimpled Tube
...Show More Authors

The enhancement of heat exchanger performance was investigated using dimpled tubes tested at different Reynolds numbers, in the present work four types of dimpled tubes with a specified configuration manufactured, tested and then compared performance with the smooth tube and other passive techniques performance. Two dimpled arrangements along the tube were investigated, these are inline and staggered at constant pitch ratio X/d=4, the test results showed that Nusselts number (heat transfer) of the staggered array is higher than the inline array by 13%.  The effect of different depths of the dimple (14.5 mm and 18.5 mm) has been also investigated; a tube with large dimple diameter enhanced the Nusselts number by about 25% for the ran

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Photodynamic Inactivation of Candida Albicans Sensitized by Malachite Green
...Show More Authors

The aim of this study is to investigate the ability of malachite green (MG) combined with 650nm diode laser to kill Candida albicans and to spectrally study the MG photodegradation after photodynamic therapy (PDT) spectrally. Cultures of Candida albicans were exposed to 40mW, 650 nm diode laser in the absence of MG. In PDT group, the MG was added to the Candida suspension for 5 min then exposed to diode laser for (5, 10, 15, 20) min at power density of 0.59W/cm2. The absorption spectrum of the photosensitized fungal suspension was obtained. The data were submitted to T-test (p<0.05). A 650nm diode laser in the presence of MG reduced the number of CFU/ml in 98.4%. Laser with 650nm alone and MG alone did not reduce significantly the num

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Treatment of Oral Conditions by 810 nm Diode Laser
...Show More Authors

When laser light incident on biological tissue, it is either reflected from the
surface of the tissue (e.g. the skin) or scattered inside the tissue or absorbed .The laser light will be
absorbed by water, hemoglobin and melanin. Absorption is also highly dependent on wave-length of
laser radiation. The absorbed light is converted into kinetic energy leading to laser effect that when
appropriately applied can produce reaction ranging from incision, vaporization to coagulation. Aim of
the study: To evaluate the efficiency of diode Laser 810 ± 20nm in treatment of oral lesions. Methods:
6 patients (2 females and 4 males) with different oral lesions were treated in the hospital of specialized
surgeries by the use of dio

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Spectroscopic Diagnostic of Cadmium Sulfide Plasma Produced By LIBS
...Show More Authors

Abstract

       The current study was carried out to reveal the plasma parameters such as ,the electron temperature ( ), electron density (ne) , plasma frequency (fp), Debye length ( ) , Debye number (   for  CdS to employ the LIBS for the purpose of analyzing and determining spectral emission lines using . The results of electron temperature for CdS range (0.746-0.856) eV , the electron density(3.909-4.691)×1018 cm-3. Finally ,we discuss plasma parameters of CdS  through  nano second  laser generated plasma .

View Publication Preview PDF
Crossref (1)
Crossref