Preferred Language
Articles
/
IxbYIIgBVTCNdQwCknRG
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.

Scopus Crossref
View Publication
Publication Date
Tue Apr 05 2022
Journal Name
International Journal Of Criminology And Sociology
Semiotics in Political Discourse. An Analytical Treatment of Political Text Criticisms Since 2003: The Case of the Discourse of Prime Minister Nouri Al-Maliki
...Show More Authors

This article discusses the function of semiotics in political discourse after the socio-political processes taking place in Iraq since 2003 and its role in the development of textual criticisms of some Iraqi politicians, analyzes the reasons for its functioning in the speech of politicians. The research is mainly focused on finding out to what extent political text studies draw on sign systems that can store and transmit information, the nature of its purpose and the use of available fields for the purpose to be achieved. The chief purpose of the study is to investigate and also clarify the symbols and signs appear within the framework of discursive Iraqi politicians, the nature of the symbols used, and the meanings that are include

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Prioritized Text Detergent: Comparing Two Judgment Scales of Analytic Hierarchy Process on Prioritizing Pre-Processing Techniques on Social Media Sentiment Analysis
...Show More Authors

Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Prepodavatel Xxi Vek
Enrichment of Vocabulary and the Formation of Grammatically Correct Speech of Foreign Students When Studying the Text of a Literary Work
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Basrah Journal Of Science
Hiding Three Images at one image by Using Wavelet Coefficients at Color Image
...Show More Authors

Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
The concept of stigma and its representations in the Arab theatrical text (The Sultan, Al-Ha'ir play, by choice): نزار شبيب كريم - علاء حاتم محسن
...Show More Authors

The research deals with the concept of stigma as one of the important phenomena that cast a shadow over the nature of the individual, his being and his personality through the inferior view with which he confronts in society, and (Sartors) indicates in this regard that stigma may lead to negative discrimination that leads to many defects, in terms of obtaining On care, poor health, service, and frequent setbacks that can damage self-esteem. The first roots of this phenomenon go back to the Greek civilization and what the Greeks used to burn and cut off some parts of the body and then announce to the nation that the bearer of this sign is a criminal. In addition to the Arab peoples living from setbacks that contributed to the exacerbation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 10 2019
Journal Name
Journal Of The College Of Education For Women
Miraculous character in Fadhil Al-Azzawi's Novels
...Show More Authors

this research adopts the study of experimentational fiction in the characters for the writer Fadhil Al-Azzawi ,which appear in the miraculous characters that the writer creates in his enumerative paragraphs , and these characters are featured by there reveling on traditions which is prevalent in the formation of these characters, The research also included theoretical beginning foe experimental fiction and miraculous characters, followed by analysis and examination of these characters in the writer`s texts, finishing by an epilogue for the results of the research , giving the references and resources we depended on writing this research .

View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
International Journal Of Special Education
Cultural Perspective of Male Outfit in the Text of the Play of Hamlet by William Shakespeare and the Application of (the Status of Apparels) Textual Analysis
...Show More Authors

Publication Date
Mon Oct 20 2025
Journal Name
Научный форум
Strategies of cultural adaptation and linguistic russification in the muravyov-kistyakovsky translation of 'the fellowship of the ring' (1982): a comprehensive study of fantasy text domestication
...Show More Authors

This study examines strategies of cultural domestication in Muravyov and Kistyakovsky’s Russian translation of (The Fellowship of the Ring). It documents transformations of character names, toponyms, dialogues, and cultural references, highlighting systematic Russification and the infusion of Soviet political commentary that reshape the text into cultural rewriting.

View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF