Preferred Language
Articles
/
dUKk_pkBMeyNPGM39btp
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-Ratio (CR), Structural-Similarity-Index Metric (SSIM), Peak Signal-to- Noise Ratio (PSNR), and Normalized-Cross-Correlation (NCC) resulted in that can get a high-quality image using WGPT than that when using WCPT. So, it is combined with a multiwavelet transform to get the third technique, HGPT. The results are implemented using MATLAB, and they indicate that the HGPT hides the message image with the best quality metrics of PSNR = 84.05262 and a high compression ratio of 16 for embedded images, whereas 76.06046 and 16 for extracted messages. This technique can be used with AI and deep learning.

View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Wed Oct 04 2023
Journal Name
Exergy - New Technologies And Applications
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel

... Show More
View Publication
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Evaluation The Performance Geodetic of the Receivers Using Static Positioning Technique
...Show More Authors

Global Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufactur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Preparation single layer of (MgO) as antireflection coating using PLD technique
...Show More Authors

In this work preparation of antireflection coating with single layer of MgO using pulsed laser deposition (PLD) method which deposit on glass substrate with different thicknesses (90 and 100) nm annealed at temperature 500 K was done.
The optical and structural properties (X-ray diffraction) have been determined. The optical reflectance was computed with the aid of MATLAB over the visible and near infrared region. Results shows that the best result obtained for optical performance of AR'Cs at 700 shots with thickness 90 nm nanostructure single layer AR'Cs and low reflection at wavelength 550 nm.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Nondestructive Evaluation of Coatings Delamination Using Microwave Time Domain Reflectometry Technique
...Show More Authors

View Publication
Scopus (23)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Monitoring of Defects Concentration in Deformed Aluminum Using Doppler Broadening Technique
...Show More Authors

Doppler broadening of the 511 keV positron annihilation ??? ? was used to estimate the concentration of defects ?? different deformation levels of pure alnminum samples. These samples were compressed at room temperature to 15, 22, 28, 38,40, and 75 % thickness reduction. The two-state ^sitron-trapping model has been employed. 'I he s and w lineshape parameters were measured using high-resolution gamma spectrometer with high pure germanium detector of 2.1 keV resolution at 1.33 MeV of 60Co. The change of defects concentration (Co) with the deformation level (e) is found to obey an empirical formula of the form Cd - A £ B where A and ? are positive constants that depend mainly on the deformation procedure and the temperature at which the def

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The robust estimators of reliability function using sample technique AM & POT
...Show More Authors

Abstract 

The Phenomenon of Extremism of Values ​​(Maximum or Rare Value) an important phenomenon is the use of two techniques of sampling techniques to deal with this Extremism: the technique of the peak sample and the maximum annual sampling technique (AM) (Extreme values, Gumbel) for sample (AM) and (general Pareto, exponential) distribution of the POT sample. The cross-entropy algorithm was applied in two of its methods to the first estimate using the statistical order and the second using the statistical order and likelihood ratio. The third method is proposed by the researcher. The MSE comparison coefficient of the estimated parameters and the probability density function for each of the distributions were

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reduction of Sulfur Compounds from Petroleum Fraction Using Oxidation-Adsorption Technique
...Show More Authors

Oxidation of sulfur compounds in fuel followed by an adsorption process were studied using two modes of operation, batch mode and continuous mode (fixed bed). In batch experiment oxidation process of kerosene with sulfur content 2360 ppm was achieved to study the effect of amount of hydrogen peroxide(2.5, 4, 6 and 10) ml at different temperature(40, 60 and 70)°C. Also the effect of amount acetic acid was studied  at the optimal conditions of the oxidation step(4ml H2O2 and 60 °C).Besides, the role of acetic acid different temperatures(40, 60, 70) °C and 4ml H2O2, effect of reaction time(5, 30, 60, 120, 300) minutes at temperatures(40,60) °C, 4ml H2O2 and 1 mlHAC)&

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Variables Affecting Developments of Hydroxyapatite Coating by Using Electrophoretic Deposition Technique
...Show More Authors

Electrophoretic Deposition (EPD) process offers various advantages like the fabrication of the ceramic coatings and bodies with dense packing, good sinterability and homogenous microstructure. The variables namely (applied potential, deposition time and sintering temperature) affected the development of hydroxyapatite (HAP) coatings. The coating weight and thickness were found to increase with the increase in applied potential or coating time. Sintering temperature was found to affect in change phases of the metal, furthermore the firing shrinkage of the HAP coating on a constraining metal substrate leads to serve cracking. XRD Characterization indicates the formation of a contamination free phase pure, and the optical micrographs show th

... Show More
View Publication Preview PDF
Crossref