Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Extraction of Bovine Serum Albumin by Aqueous Two-Phase System Using PEG4000/Sodium Citrate and PEG8000/Sodium Phosphate
...Show More Authors

Aqueous Two Phase System (ATPS) or liquid-liquid extraction is used in biotechnology to recover valuable compounds from raw sources. In Aqueous Two-Phase Systems, many factors influence the Partition coefficient, K, (which is the ratio of protein concentration in the top phase to that in the bottom phase) and the Recovery percentage (Rec%). In this research, two systems of ATPS were used: first, polyethylene glycol (PEG) 4000/Sodium citrate (SC), and the second, PEG8000/ Sodium phosphate (SPH), for the extraction of Bovine Serum Albumin (BSA). The behavior of Rec% and K of pure (BSA) in ATPS has been investigated throughout the study by the effects of five parameters: temperature, concentration of polyethylene glycol (P

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Finite Element Analysis for the Damaged Rotating Composite Blade
...Show More Authors

In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included.  The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Dec 18 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Challenges of Translation from Persian to Arabic In Light of the Equivalence Theory of Mona Baker; Equivalence at the Word Level
...Show More Authors

This dissertation studies the application of equivalence theory developed by Mona Baker in translating Persian to Arabic. Among various translation methodologies, Mona Baker’s bottom-up equivalency approach is unique in several ways. Baker’s translation approach is a multistep process. It starts with studying the smallest linguistic unit, “the word”, and then evolves above the level of words leading to the translation of the entire text. Equivalence at the word level, i.e., word for word method, is the core point of Baker’s approach.

This study evaluates the use of Baker’s approach in translation from Persian to Arabic, mainly because finding the correct equivalence is a major challenge in this translation. Additionall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Ieee Communications Letters
Modified Blind Source Separation for Securing End-to-End Mobile Voice Calls
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (17)
Scopus
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
The Spatial Analysis for Bassia eriophora (Schrad.) Asch. Plant Distributed in all IRAQ by Using RS & GIS Techniques
...Show More Authors

        Most vegetation’s are Land cover (LC) for the globe, and there is an increased attention to plants since they represent an element of balance to natural ecology and maintain the natural balance of rapid changes due to systematic and random human uses, including the subject of the current study (Bassia eriophora ) Which represent an essential part of the United Nations system for land cover classification (LCCS), developed by the World Food Organization (FAO) and the world Organization for environmental program (UNEP), to observe basic environmental elements with modern techniques. Although this plant is distributed all over Iraq, we found that this plant exists primarily in the middle

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (6)
Scopus Clarivate Crossref