Preferred Language
Articles
/
bsj-4530
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Making political image in the election campaigns
...Show More Authors

The study discusses the marketing profile of electoral candidates and politicians especially the image that takes root in the minds of voters has become more important than the ideologies in the technological era or their party affiliations and voters are no longer paying attention to the concepts of a liberal, conservative, right-wing or secular, etc. while their interests have increased towards candidates. The consultants and image experts are able to make a dramatic shift in their electoral roles. They, as specialists in the electoral arena, dominate the roles of political parties.
The importance of the study comes from the fact that the image exceeds its normal framework in our contemporary world to become political and cultural

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Compression of an ECG Signal Using Mixed Transforms
...Show More Authors

Electrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Medical Image Compression using Wavelet Quadrants of Polynomial Prediction Coding & Bit Plane Slicing
...Show More Authors

Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Jordan Journal Of Mechanical And Industrial Engineering
Empact of Discrete Multi-arc Rib Roughness on the Effective Efficiency of a Solar Air Heater
...Show More Authors

Artificial roughness on the absorber plate of a Solar Air Heater (SAH) is a popular technique for increasing its effective efficiency. The study investigated the effect of geometrical parameters of discrete multi-arc ribs (DMAR) installed below the SAH absorber plate on the effective efficiency. The effects of major roughness factors, such as number of gaps (Ng = 1-4), rib pitch (p/e = 4-16), rib height (e/D = 0.018-0.045), gab width (wg/e = 0.5-2), angle of attack ( = 30-75), and Reynolds number (Re= 2000-20000) on the performance of a SAH are studied. The performance of the SAH is evaluated using a top-down iterative technique. The results show that as Re rises, SAH-effective DMAR's efficiency first ascends to a specified value o

... Show More
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Determination of essential and trace elements in various vegetables using ICP-MS
...Show More Authors

Metal contents in vegetables are interesting because of issues related to food safety and ‎potential health risks. The availability of these metals in the human body ‎may perform many biochemical functions and some of them linked with various diseases at ‎high levels. The current study aimed to evaluate the concentration of various metals in ‎common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables ‎of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common ‎purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for ‎Ba, ‎2812‎-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–‎‎1.

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Utilising modelling software to convert functional utensils into ceramic art.
...Show More Authors

Contemporary art has been widely affected by technology, and ceramics production is no exception. As an ancient art that originates from clay and other humble materials found in the ground, ceramics is considered one of the most adaptable art forms. Once it is realised how flexible ceramics as a material is, it can be easily altered into endless forms and shapes. Therefore, it is vital for ceramics practitioners to find a relationship between this wonderful material and the media of contemporary art, culture and modelling software or technology in general so that they can take their deformable art pieces to a whole new level. Such a relationship is worth investigating. Thus, for the purposes of this research, several ceramic pieces were

... Show More
View Publication Preview PDF
Crossref