Preferred Language
Articles
/
fxbjB4cBVTCNdQwCwDC3
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods in terms of average segmental SNR, number of failing samples, and Czekanowski Distance (CZD). In addition, the proposed method shows the ability to operate with large message sizes (up to half of carrier size) with graceful degradation as opposed to the other methods which fail at large message size. So, the proposed method provides more flexibility in message and carrier sizes while preserving high efficiency.

Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 04 2016
Journal Name
European Journal Of Oral Sciences
Experimental polyethylene-hydroxyapatite carrier-based endodontic system: an in vitro study on dynamic thermomechanical properties, sealing ability, and measurements of micro-computed tomography voids
...Show More Authors

The dynamic thermomechanical properties, sealing ability, and voids formation of an experimental obturation hydroxyapatite-reinforced polyethylene (HA/PE) composite/carrier system were investigated and compared with those of a commercial system [GuttaCore (GC)]. The HA/PE system was specifically designed using a melt-extrusion process. The viscoelastic properties of HA/PE were determined using a dynamic thermomechanical analyser. Human single-rooted teeth were endodontically instrumented and obturated using HA/PE or GC systems, and then sealing ability was assessed using a fluid filtration system. In addition, micro-computed tomography (μCT) was used to quantify apparent voids within the root-canal space. The data were statistically analys

... Show More
View Publication
Crossref (7)
Clarivate Crossref
Publication Date
Sat Sep 21 2013
Journal Name
Nonlinear Dynamics
BER performance enhancement for secure wireless optical communication systems based on chaotic MIMO techniques
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Multimedia Tools And Applications
Attention enhancement system for college students with brain biofeedback signals based on virtual reality
...Show More Authors

View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Rimak International Journal Of Humanities And Social Sciences
BUILDING THE MEDIA MESSAGE AND DESIGNING IT THROUGH INFOGRAPHICS
...Show More Authors

The study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the

... Show More
View Publication
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Iraqi Journal Of Physics
Enhancement of Photoconductive Detector Based on Carbon Nanotubes Decorated with Silver Nanoparticles by Adding Conductive Polymer
...Show More Authors

In this work, wide band range photo detector operating in UV, Visible and IR was fabricated using carbon nanotubes (MWCNTs, SWCNTs) decorated with silver nanoparticles (Ag NPs). Silicon was used as a substrate to deposited CNTs/Ag NPs by the drop casting technique. Polyamide nylon polymer was used to coat CNTs/Ag NPs to enhance the photo-response of the detector. The electro-exploding wire technology was used to synthesize Ag NPs. Good dispersion of silver NPs achieved by a simple chemistry process on the surface of CNTs. The optical, structure and electrical characteristic of CNTs decorated with Ag NPs were characterized by X-Ray diffraction and Field Emission Scanning Electron Microscopy.  X-ray diffra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Mechanisms of Social Change in the Era of Digital Communication and its Effects on the Communicative Message
...Show More Authors

When sites of new communication occurs which represents the merit of the development of communication technology which is characterized by the services of ( facebook-twiter-corapora-youtube-mass space-friendster-flicker-willnecked in addition to the direct services for viber-whatsup-telgram-and chat on) play important role in changing the infrastructure of Arabic societies which are consideredas closed and not changeable societies during near period and the significance of this study comes from the importounce of this subject which is considered as anew trend of the age on the field of media and public response and acceptance inspite of what is known about Arabic society-it doesn’t accept change-this occurance is associated with terms

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Iet Signal Processing
Signal compression and enhancement using a new orthogonal‐polynomial‐based discrete transform
...Show More Authors

View Publication
Scopus (41)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Deep Learning-Based Speech Enhancement Algorithm Using Charlier Transform
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref