Preferred Language
Articles
/
alkej-103
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested system used self crypto-hiding pseudo random key generator. The auto-key generator has purposes to investigate the encryption and embedding processes .The hiding results shows no noise in the stego-wave file after embedding process, also no difference in size is found between the original wave audio file and stego-wave file.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Using TermoDeck System for Pre-Cooling/ Heating to Control the Building Inside Conditions
...Show More Authors

In this paper, experimental study has been done for temperature distribution in space conditioned with Ventilation Hollow Core Slab (TermoDeck) system. The experiments were carried out on a model room with dimensions of (1m 1.2m 1m) that was built according to a suitable scale factor of (1/4). The temperature distributions was measured by 59 thermocouples fixed in several locations in the test room. Two cases were considered in this work,  the first one during unoccupied period at night time (without external load) and the other at day period with external load of 800W/m2 according to solar heat gain calculations during summer season in Iraq. All results confirm the use of TermoDeck system for ventilation and cooling/heat

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
مجلة آداب المستنصرية
(Semantic expansion in the Arabic system)
...Show More Authors

The principle in the language is that each word has one meaning. This is because the purpose of language development is for understanding, understanding, and communication between people. The language is sounds with which each people expresses their Arabic language did not stop at this point, but rather needed another next stage or to convey additional features or characteristics that would qualify it. To be the language of the Qur’an and revelation, and capable of carrying this heavy burden.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
information and communication technologies and their impact on changed the financial reporting system In a Sample in Iraqi banks
...Show More Authors

paid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Risk Analysis of Projects Accordance with the Professional Project Management System: A case- Study Mansur Construction Contracting Company here
...Show More Authors

The research aims to identify the risks faced by projects and work on the administration, such as those risks by using professional Project Management System (Project Management Professional) by identifying those risks and their impact on the objectives of the project, if they occur and to provide appropriate responses to Ha.autam search application on the draft Law Faculty port by the General Mansour Construction Contracting company has been using a method personal interview with the heads of departments and project managers in the Al-Mansour and tools descriptive and quantitative analysis as was used (likelihood and impact of risk analysis, Ai_kaoa scheme Sbb- effect, analysis of probability and impact, risk matrix (probability

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
New sizes of complete (k, 4)-arcs in PG(2,17)
...Show More Authors

              In this paper, the packing problem for complete (  4)-arcs in  is partially solved. The minimum and the maximum sizes of complete (  4)-arcs in  are obtained. The idea that has been used to do this classification is based on using the algorithm introduced in Section 3 in this paper. Also, this paper establishes the connection between the projective geometry in terms of a complete ( , 4)-arc in  and the algebraic characteristics of a plane quartic curve over the field  represented by the number of its rational points and inflexion points. In addition, some sizes of complete (  6)-arcs in the projective plane of order thirteen are established, namely for  = 53, 54, 55, 56.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref