首页 > 最新文献

Iraqi Journal for Computers and Informatics最新文献

英文 中文
FEATURE-BASED FACE DETECTION: A SURVEY 基于特征的人脸检测研究
Pub Date : 2018-12-31 DOI: 10.25195/2017/4426
Tanya abdul-sattar jabor
{"title":"FEATURE-BASED FACE DETECTION: A SURVEY","authors":"Tanya abdul-sattar jabor","doi":"10.25195/2017/4426","DOIUrl":"https://doi.org/10.25195/2017/4426","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69282036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A SUGGESTED SUPER SALSA STREAM CIPHER 一种建议的超SALSA流密码
Pub Date : 2018-12-31 DOI: 10.25195/ijci.v44i2.51
M. S. Mahdi, N. Hassan
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specifiedfor apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsakeystream utilizing various volumes matrices size (array (4, 4), array (4, 8), array (4, 16)) are used to increase the complexity ofkey stream and make it more reluctant to linear and differential attacks. Furthermore, in each iteration, the diffusion ofgenerated keystream will increase due the effect of changing the volume acting for one element of the array is not fixed. Thegenerated keys of the suggested Super SALSA keystream are depicted as simple operations and a high hardiness randomlykeystream by exceeding the five benchmark tests. Likewise, it's presenting a situation of equilibrium between complexity andspeed for Salsa (8, 12 and 20).
Salsa(20)密码比AES密码更快,并且提供了优越的安全性。Salsa(8)和Salsa(12)适用于安全级别低于速度的应用程序。本研究的概念是建议使用利用各种体积矩阵大小的超salsakeystream(数组(4,4)、数组(4、8)、数组)来增加密钥流的复杂性,使其更不愿意受到线性和差分攻击。此外,在每次迭代中,由于改变作用于阵列中一个元素的体积的影响是不固定的,因此生成的密钥流的扩散将增加。所提出的Super SALSA密钥流的生成密钥被描述为简单的操作和通过超过五个基准测试的高刚性随机密钥流。同样,它为Salsa(8、12和20)呈现了复杂性和速度之间的平衡状态。
{"title":"A SUGGESTED SUPER SALSA STREAM CIPHER","authors":"M. S. Mahdi, N. Hassan","doi":"10.25195/ijci.v44i2.51","DOIUrl":"https://doi.org/10.25195/ijci.v44i2.51","url":null,"abstract":"Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specifiedfor apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsakeystream utilizing various volumes matrices size (array (4, 4), array (4, 8), array (4, 16)) are used to increase the complexity ofkey stream and make it more reluctant to linear and differential attacks. Furthermore, in each iteration, the diffusion ofgenerated keystream will increase due the effect of changing the volume acting for one element of the array is not fixed. Thegenerated keys of the suggested Super SALSA keystream are depicted as simple operations and a high hardiness randomlykeystream by exceeding the five benchmark tests. Likewise, it's presenting a situation of equilibrium between complexity andspeed for Salsa (8, 12 and 20).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45879263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
FEATURE-BASED FACE DETECTION: A SURVEY 基于特征的人脸检测研究综述
Pub Date : 2018-06-30 DOI: 10.25195/ijci.v44i1.109
Abbas Albakri, S. Al-Mamory, Hadeel H. Alfartosy
Human and computer vision has a vital role in intelligent interaction with computer, face recognition is one of the subjects that have a wide area in researches, a big effort has been exerted in last decades for face recognition, face detection, face tracking, as yet new algorithms for building fully automated system are required, these algorithms should be robust and efficient. The first step of any face recognition system is face detection, the goal of face detection is the extraction of face region within image, taking into consideration lightning, orientation and pose variation, whenever this step accurate the result of face recognition will be better, this paper introduce a survey of techniques and methods of feature based face detection.
人类和计算机视觉在与计算机的智能交互中起着至关重要的作用,人脸识别是研究领域广泛的课题之一,在过去几十年中,人们在人脸识别、人脸检测、人脸跟踪等方面付出了巨大的努力,但对构建全自动化系统还需要新的算法,这些算法应该是稳健和高效的。任何人脸识别系统的第一步都是人脸检测,人脸检测的目标是提取图像中的人脸区域,考虑到闪电、方位和姿态的变化,只要这一步准确,人脸识别的结果就会更好,本文介绍了基于特征的人脸检测技术和方法。
{"title":"FEATURE-BASED FACE DETECTION: A SURVEY","authors":"Abbas Albakri, S. Al-Mamory, Hadeel H. Alfartosy","doi":"10.25195/ijci.v44i1.109","DOIUrl":"https://doi.org/10.25195/ijci.v44i1.109","url":null,"abstract":"Human and computer vision has a vital role in intelligent interaction with computer, face recognition is one of the subjects that have a wide area in researches, a big effort has been exerted in last decades for face recognition, face detection, face tracking, as yet new algorithms for building fully automated system are required, these algorithms should be robust and efficient. The first step of any face recognition system is face detection, the goal of face detection is the extraction of face region within image, taking into consideration lightning, orientation and pose variation, whenever this step accurate the result of face recognition will be better, this paper introduce a survey of techniques and methods of feature based face detection.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43351223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AUTOMATIC IRAQI CARS NUMBER PLATES EXTRACTION 伊拉克汽车号牌自动提取
Pub Date : 2018-06-30 DOI: 10.25195/ijci.v44i1.111
Safaa S. Omran, Jumana A. Jarallah
License Plate Recognition (LPR) system becomes animportant research issue in recent years due to its importance to wideranges of commercial applications. The first and the most importantstage for any LPR system is the localization of the number platewithin the vehicle image. This paper presents a methodology for Iraqicars number plates extraction from the vehicle image using twomethods, the first one is morphological operations and the secondmethod is edge detection. The main idea is to use these two differentmethods in such away so that the number plate of the vehicle can beextracted precisely. These algorithms can quickly and correctly detectand extract the number plate from the vehicle image although therewas a little noise in the image. This paper also makes a comparisonbetween the two methods of extraction in results. The software thatused to build the systems is MATLAB R2014a
车牌识别系统因其在广泛的商业应用中的重要性而成为近年来的一个重要研究课题。任何LPR系统的第一个也是最重要的阶段是车牌在车辆图像中的定位。本文提出了一种从车辆图像中提取伊拉克车牌的方法,使用两种方法,第一种是形态学运算,第二种是边缘检测。其主要思想是使用这两种不同的方法,这样就可以精确地提取车辆的车牌。这些算法可以快速、准确地从车辆图像中检测和提取车牌,尽管图像中存在少量噪声。本文还对两种提取方法的结果进行了比较。用于构建系统的软件是MATLAB R2014a
{"title":"AUTOMATIC IRAQI CARS NUMBER PLATES EXTRACTION","authors":"Safaa S. Omran, Jumana A. Jarallah","doi":"10.25195/ijci.v44i1.111","DOIUrl":"https://doi.org/10.25195/ijci.v44i1.111","url":null,"abstract":"License Plate Recognition (LPR) system becomes animportant research issue in recent years due to its importance to wideranges of commercial applications. The first and the most importantstage for any LPR system is the localization of the number platewithin the vehicle image. This paper presents a methodology for Iraqicars number plates extraction from the vehicle image using twomethods, the first one is morphological operations and the secondmethod is edge detection. The main idea is to use these two differentmethods in such away so that the number plate of the vehicle can beextracted precisely. These algorithms can quickly and correctly detectand extract the number plate from the vehicle image although therewas a little noise in the image. This paper also makes a comparisonbetween the two methods of extraction in results. The software thatused to build the systems is MATLAB R2014a","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41509228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PROPOSED APPROACH FOR IMPROVING RNA CRYPTO-KEY BASED ON POLYNOMIAL CONVOLUTION 提出了一种基于多项式卷积改进RNA加密密钥的方法
Pub Date : 2018-06-30 DOI: 10.25195/ijci.v44i1.65
Estabraq Abdulredaa Kadhim
Random Number Generators are fundamental toolsfor cryptography protocols and algorithms. The basic problems thatface any crypto key generator are randomness, correlations anddistribution of the state of key sequence. This paper proposed a newmethod to enhance RNA crypto key generation. It has beenimplemented by extending the crypto key by applying polynomialconvolution technique which extracts the mask filter from the sameRNA key sequence depending on the start and end codon properties.This will provide another high level of extension and generaterandom-strength crypto key. The proposal approach could passthrough the statistical measurements successfully and achieved highrate of randomness (approximated to 96%).
随机数生成器是加密协议和算法的基本工具。任何加密密钥生成器所面临的基本问题是密钥序列状态的随机性、相关性和分布性。提出了一种增强RNA加密密钥生成的新方法。它是通过应用多项式卷积技术扩展加密密钥来实现的,该技术根据开始和结束密码子的属性从samamerna密钥序列中提取掩码滤波器。这将提供另一个高级别的扩展和生成随机强度加密密钥。该方法可以成功地通过统计测量,并达到较高的随机率(接近96%)。
{"title":"PROPOSED APPROACH FOR IMPROVING RNA CRYPTO-KEY BASED ON POLYNOMIAL CONVOLUTION","authors":"Estabraq Abdulredaa Kadhim","doi":"10.25195/ijci.v44i1.65","DOIUrl":"https://doi.org/10.25195/ijci.v44i1.65","url":null,"abstract":"Random Number Generators are fundamental toolsfor cryptography protocols and algorithms. The basic problems thatface any crypto key generator are randomness, correlations anddistribution of the state of key sequence. This paper proposed a newmethod to enhance RNA crypto key generation. It has beenimplemented by extending the crypto key by applying polynomialconvolution technique which extracts the mask filter from the sameRNA key sequence depending on the start and end codon properties.This will provide another high level of extension and generaterandom-strength crypto key. The proposal approach could passthrough the statistical measurements successfully and achieved highrate of randomness (approximated to 96%).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47705889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A RADIAL BASIS NEURAL NETWORK CONTROLLER TO SOLVE CONGESTION IN WIRELESS SENSOR NETWORKS 一种解决无线传感器网络拥塞的径向基神经网络控制器
Pub Date : 2018-06-01 DOI: 10.25195/2017/4419
M. Hussain
In multihop networks, such as the Internet and the Mobile Ad-hoc Networks, routing is one of the most importantissues that has an important effect on the network’s performance. This work explores the possibility of using the shortest path routingin wireless sensor network . An ideal routing algorithm should combat to find an perfect path for data that transmitted within anexact time. First an overview of shortest path algorithm is given. Then a congestion estimation algorithm based on multilayerperceptron neural networks (MLP-NNs) with sigmoid activation function, (Radial Basis Neural Network Congestion Controller(RBNNCC) )as a controller at the memory space of the base station node. The trained network model was used to estimate trafficcongestion along the selected route. A comparison study between the network with and without controller in terms of: trafficreceived to the base station, execution time, data lost, and memory utilization . The result clearly shows the effectiveness of RadialBasis Neural Network Congestion Controller (RBNNCC) in traffic congestion prediction and control.
在多跳网络中,如互联网和移动自组织网络,路由是最重要的问题之一,对网络的性能有着重要的影响。这项工作探索了在无线传感器网络中使用最短路径路由的可能性。理想的路由算法应该努力为在精确时间内传输的数据找到一条完美的路径。首先对最短路径算法进行了概述。然后提出了一种基于具有S形激活函数的多层感知器神经网络(MLP-NNs)的拥塞估计算法(径向基神经网络拥塞控制器(RBNNCC))作为基站节点存储空间的控制器。训练后的网络模型用于估计所选路线上的交通拥堵。有控制器和没有控制器的网络在以下方面的比较研究:基站接收的流量、执行时间、数据丢失和内存利用率。结果清楚地表明了径向基神经网络拥塞控制器(RBNNCC)在交通拥塞预测和控制中的有效性。
{"title":"A RADIAL BASIS NEURAL NETWORK CONTROLLER TO SOLVE CONGESTION IN WIRELESS SENSOR NETWORKS","authors":"M. Hussain","doi":"10.25195/2017/4419","DOIUrl":"https://doi.org/10.25195/2017/4419","url":null,"abstract":"In multihop networks, such as the Internet and the Mobile Ad-hoc Networks, routing is one of the most importantissues that has an important effect on the network’s performance. This work explores the possibility of using the shortest path routingin wireless sensor network . An ideal routing algorithm should combat to find an perfect path for data that transmitted within anexact time. First an overview of shortest path algorithm is given. Then a congestion estimation algorithm based on multilayerperceptron neural networks (MLP-NNs) with sigmoid activation function, (Radial Basis Neural Network Congestion Controller(RBNNCC) )as a controller at the memory space of the base station node. The trained network model was used to estimate trafficcongestion along the selected route. A comparison study between the network with and without controller in terms of: trafficreceived to the base station, execution time, data lost, and memory utilization . The result clearly shows the effectiveness of RadialBasis Neural Network Congestion Controller (RBNNCC) in traffic congestion prediction and control.","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44718667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
DESIGN AND IMPLEMENT CHAT PROGRAM USING TCP/IP 基于TCP/IP的聊天程序的设计与实现
Pub Date : 2018-06-01 DOI: 10.25195/2017/4417
Mohammed E. Ahmed, S. Rafea, Lara Falah, Liqaa Abd Ullah
LAN Chat Messenger using TCP/IP offers reliability, security and zero cost communication among staff members of acompany. As well, this study offers file transfer. It helps to solve the communication problems that related to time and cost. The proposedprotocol facilitates information exchange among individuals by providing many communication options. It is a standaloneapplication using JAVA as the programming language and tested at LANs of our institute (college's Labs networks).
使用TCP/IP的局域网聊天信使提供了可靠性、安全性和公司员工之间的零成本通信。此外,这项研究还提供了文件传输。它有助于解决与时间和成本相关的沟通问题。所提出的协议通过提供许多通信选项来促进个人之间的信息交换。它是一个以JAVA为编程语言的独立应用程序,并在我院局域网(学院实验室网络)上进行了测试。
{"title":"DESIGN AND IMPLEMENT CHAT PROGRAM USING TCP/IP","authors":"Mohammed E. Ahmed, S. Rafea, Lara Falah, Liqaa Abd Ullah","doi":"10.25195/2017/4417","DOIUrl":"https://doi.org/10.25195/2017/4417","url":null,"abstract":"LAN Chat Messenger using TCP/IP offers reliability, security and zero cost communication among staff members of acompany. As well, this study offers file transfer. It helps to solve the communication problems that related to time and cost. The proposedprotocol facilitates information exchange among individuals by providing many communication options. It is a standaloneapplication using JAVA as the programming language and tested at LANs of our institute (college's Labs networks).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49242042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LT10 A LIGHTWEIGHT PROPOSED ENCRYPTION ALGORITHM FOR IOT Lt10是一种轻量级的物联网加密算法
Pub Date : 2018-06-01 DOI: 10.25195/2017/4411
Hiba Taresh
In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bit
本文提出了一种轻量级的加密算法(LT10),该算法最初由四个kasumi元素组成,该算法考虑到物联网设备的计算能力有限,以及智能家居和物联网网络信息需要交换的敏感性,密钥长度为128位,块长度为128位
{"title":"LT10 A LIGHTWEIGHT PROPOSED ENCRYPTION ALGORITHM FOR IOT","authors":"Hiba Taresh","doi":"10.25195/2017/4411","DOIUrl":"https://doi.org/10.25195/2017/4411","url":null,"abstract":"In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bit","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41343571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proposed Approach for Improving RNA Crypto-Key Based on Polynomial Convolution 一种基于多项式卷积的改进RNA密钥的方法
Pub Date : 2018-06-01 DOI: 10.25195/2017/4412
Estabraq Abdul Redaa Kadhim
{"title":"Proposed Approach for Improving RNA Crypto-Key Based on Polynomial Convolution","authors":"Estabraq Abdul Redaa Kadhim","doi":"10.25195/2017/4412","DOIUrl":"https://doi.org/10.25195/2017/4412","url":null,"abstract":"","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43505091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMAGE HIDING ON HIGH FREQUENCY SPEECH COMPONENTS USING WAVELET PACKET TRANSFORM 基于小波包变换的高频语音图像隐藏
Pub Date : 2018-06-01 DOI: 10.25195/2017/4418
M. Al-Turfi
This paper propose a method for security threw hiding the image inside the speech signal by replacing the high frequencycomponents of the speech signal with the data of the image where the high frequency speech components are separated and analyzed usingthe Wavelet Packet Transform (WPT) where the new signal will be remixed to create a new speech signal with an embedded image. The algorithm is implemented on MATLAB 15 and is designed to achieve best image hiding where the reconstruction rate was more than 94% while trying to maintain the same size of the speech signal to overcome the need for a powerful channel to handle the task. Best results were achieved with higher speech resolution (higher number of bits per sample) and longer periods (higher number of samples in the media file).
本文提出了一种安全的方法,通过用图像的数据替换语音信号的高频分量来将图像隐藏在语音信号中,其中高频语音分量被分离并使用小波包变换(WPT)进行分析,其中新信号将被重新混合以创建具有嵌入图像的新语音信号。该算法在MATLAB 15上实现,设计用于实现最佳图像隐藏,其中重建率超过94%,同时试图保持语音信号的相同大小,以克服对强大通道处理任务的需求。通过更高的语音分辨率(每个样本的位数更高)和更长的周期(媒体文件中的样本数更高)获得了最佳结果。
{"title":"IMAGE HIDING ON HIGH FREQUENCY SPEECH COMPONENTS USING WAVELET PACKET TRANSFORM","authors":"M. Al-Turfi","doi":"10.25195/2017/4418","DOIUrl":"https://doi.org/10.25195/2017/4418","url":null,"abstract":"This paper propose a method for security threw hiding the image inside the speech signal by replacing the high frequencycomponents of the speech signal with the data of the image where the high frequency speech components are separated and analyzed usingthe Wavelet Packet Transform (WPT) where the new signal will be remixed to create a new speech signal with an embedded image. The algorithm is implemented on MATLAB 15 and is designed to achieve best image hiding where the reconstruction rate was more than 94% while trying to maintain the same size of the speech signal to overcome the need for a powerful channel to handle the task. Best results were achieved with higher speech resolution (higher number of bits per sample) and longer periods (higher number of samples in the media file).","PeriodicalId":53384,"journal":{"name":"Iraqi Journal for Computers and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43542308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Iraqi Journal for Computers and Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1