Preferred Language
Articles
/
bsj-6216
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
The Potential of some Plant Extracts as Radical Scavengers and Dipeptidyl Peptidase-4 Inhibitors
...Show More Authors

Seeds, beans, leaves, fruit peel and seeds of five plants (Ferula assa-foetida, Coffea robusta, Olea europaea, Punica granatum and Vitis vinifera, respectively) were extracted with four solvents (distilled water, 80% methanol, 80% acetone and a mixed solvent that included methanol, ethanol, acetone and n-butanol at proportions 7:1:1:1). Such manipulation yielded 20 extracts, which were phytochemically analyzed for total polyphenols (TP) and flavonoids (TF). The DPPH (2,2-diphenyl-1-picrylhydrazyl) radical scavenging activity (RSA) and DPP-4 (dipeptidyl peptidase-4) relative inhibition activity (RIA) were also assessed for each extract. The results revealed that mixed solvent extract of V.

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Determination of Nickel and Cobalt in Cosmetic Products Marketed in Iraq Using Spectrophotometric and Microfluidic Paper-based Analytical Device (µPADs) Platform
...Show More Authors

Two quantitative, environment-friendly and easily monitored assays for Ni (II) and Co (III) ions analysis in different lipstick samples collected from 500-Iraqi dinars stores located in Baghdad were introduced. The study was based on the reaction of nickel (II) ions with dimethylglyoxime (DMG) reagent and the reaction of cobalt (III) ions with 1-nitroso-2-naphthol (NN) reagent to produce colored products. The color change was measured by spectrophotometric method at 565 nm and 430 nm for Ni and Co, respectively, with linear calibration graphs in the concentration range 0.25-100 mg L-1 (Ni) and 0.5-100 mg L-1 (Co) and LOD and LOQ of 0.11 mg L-1 and 0.36 mg L-1 (Ni), and 0.15 mg L-1 an

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (9)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Improving the Accuracy of Handheld GPS Receivers Based on NMEA File Generating and Least Squares Adjustment
...Show More Authors

This study aims to improve the quality of satellites signals in addition to increase accuracy level delivered from handheld GPS data by building up a program to read and decode data of handheld GPS. Where, the NMEA protocol file, which stands for the National Marine Electronics Association, was generated from handheld GPS receivers in real time using in-house design program. The NMEA protocol file provides ability to choose points positions with best status level of satellites such as number of visible satellite, satellite geometry, and GPS mode, which are defined as accuracy factors. In addition to fix signal quality, least squares technique was adopted in this study to minimize the residuals of GPS observations and enh

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 17 2022
Journal Name
Iraqi Journal Of Laser
PDF Cavity Disinfection Using Er,Cr:YSGG Laser Induced Photoacoustic Streaming Technique: Rand kareem Jassim Hussein Ali Jawad*
...Show More Authors

Abstract:

Aim: The goal of this research was to study the influence of Er,Cr:YSGG laser at short pulse duration (60 µsec) on the number of streptococcus mutans bacteria in vitro.

Material and Methods:  twenty-eight extracted third molars free of caries, cracks, and other irregularities were used. For the testing of the materials, both the agar well technique and a tooth cavity model were employed. The agar wells of plates that had been inoculated with Streptococcus mutans previously were stuffed with the test materials, in order to conduct the tests. The zones of inhibition were assessed using millimeter measurements, after an incubation period of 48 hours .In order to a

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of applying resource consumption accounting technology on rationalizing pricing decisions in economic units
...Show More Authors

The aim of the research is to demonstrate the extent of the impact of resource consumption accounting technicality as an administrative technique that is compatible with the rapid developments and changes in the external environment, with the information it provides and scientific foundations in the allocation of indirect costs, and the identification and measurement of idle energy and its costs in a way that contributes to the rationalization of pricing decisions in economic units. In light of the intense competition and the multiplicity of alternatives, and to achieve this goal, a random sample was chosen.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Negative skin friction evaluation and mitigation: A review study
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Bas.j
PARATHYROID GLAND, ANATOM, HISTOLOGY, AND PHYSIOLOGY (A SHORT REVIEW)
...Show More Authors

Publication Date
Wed May 01 2024
Journal Name
Journal Of Madenat Alelem College
Study 1,4- Naphthoquinone Derivative and Biological Activity: A Review
...Show More Authors

In this work, we focused on studying 1,4-naphthoquinones and their derivatives, and knowing the methods of preparing them using different auxiliary agents and forming derivatives containing heterocyclic rings, active groups and saturated rings containing heterogeneous elements . In addition, due to their strong antibacterial, antifungal and anticancer activity, 1,4-naphthoquinone compounds biological importance and are considered a source of various pharmaceutical compounds.