Preferred Language
Articles
/
bsj-7926
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Study of Using of Recycled Brick Waste (RBW) to produce Environmental Friendly Concrete: A Review
...Show More Authors

Several million tons of solid waste are produced each year as a result of construction and demolition activities around the world, and brick waste is one of the most widely wastes. Recently, there has been growing number in studies that conducted on using of recycling brick waste (RBW) to produce environmentally friendly concrete. The use of brick waste (BW) as potential partial cement or aggregate replacement materials is summarized in this review where the performance is discussed in the form of the mechanical strength and properties that related to durability of  concrete. It was found that, because the pozzolanic activity of clay brick powder, it can be utilized as substitute for cement in replacement level up t

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Sat May 10 2025
Journal Name
سفير برس
استشراق مؤسسات المعلومات في عام 2050
...Show More Authors

يتناول هذا المقال تصورًا مستقبليًا لمؤسسات المعلومات في عام 2050، حيث يستعرض كيف ستتغير بنيتها لتصبح ذكية ومستدامة، ويستعرض دور أخصائي المعلومات في بيئة رقمية متقدمة. كما يناقش تطور مصادر المعلومات وخدماتها، ونُظم تنظيمها، بالإضافة إلى تنوع المستفيدين، مع إبراز دور هذه المؤسسات في دعم التنمية المستدامة

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (21)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Explainable Artificial Intelligence In The Digital Sustainability Administration
Artificial Intelligence and Trends Using in Sustainability Audit: A Bibliometric Analysis
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Application of Groebner Bases to Study a Communication System
...Show More Authors

This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
Technical Variation in Scientific Model
...Show More Authors

The present study tackles the scientific model and the mechanisms of operating in the formation of the image of the artistic work to create a scene that cares for the aesthetic decoration through raw and techniques and employing them to express the aesthetic values that care for what is not familiar and deviation from the familiar in the visual exhibition and the care for the employment of the technical abilities, lighting, and sound as well as the employment of multiple materials. The research presents the objectives of his study in the exhibition hall of Natural History Museum (University of Baghdad) to create an aesthetic and expressive state at the same time. Then, in the theoretical framework the researcher traces the experiments of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
NEGOTIATION SKILLS OF THE EMPLOYEES OF PUBLIC RELATIONS IN THE GOVERNMENT INSTITUTIONS : (Ministry of Electricity and Ministry of Transportation as a Model)
...Show More Authors

This research dealt with the subject of negotiation skills of employees in public relations departments which is one of many skills supposed to be available to these employees. These skills combined help in the success of the job of public relations departments; and give them an important and vital role within the roles distributed in the departments of any government institution wither is governmental or non-governmental.

Negotiation is a skill that requires intelligence, tact, culture, information, intuition, and knowing to use the means of communication to access the information that is useful in reaching satisfactory results

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of External Oversight in The Organization of Policy Import: A model of Supreme Audit
...Show More Authors

  The construction of development is required to develop various economic sectors with the necessity to meet the various requirement of both individuals and institutions , or through the import process , which must be commensurate with the needs of the market and the economy and development. But in fact , we found that the process of import in Iraq after 2003 took a turn dangerous excesses on limits of philosophy and objectives of the import , which  reflected  the level of national production as well as the policy of dumping and given to the lack of matching a lot of goods and materials imported for Standards and Measures of quality and stands behind it causes many of them exposure to the market and weak sectors with an o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of External Oversight in The Organization of Policy Import: A model of Supreme Audit
...Show More Authors

The construction of development is required to develop various economic sectors with the necessity to meet the various requirement of both individuals and institutions , or through the import process , which must be commensurate with the needs of the market and the economy and development. But in fact , we find that the process of import in Iraq after 2003 took a turn dangerous excesses on limits of philosophy and objectives of the import , which is reflected at the level of national production as well as the policy of dumping and given and the lack of matching a lot of goods and materials imported for Standards and Measures of quality and stands behind it causes many of them exposure to the market and weak sectors with an overlap betwee

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref