Table of content

Iraqi Journal for Computers and Informatics ijci

المجلة العراقية للحاسبات والمعلوماتية

ISSN: 2313190X 25204912
Publisher: University Of Informatics Technology And Communications
Faculty:
Language: Arabic and English

This journal is Open Access

About

IJCI is a peer-review institutional journal issued by the University of Information Technology and Communications (UoITC) in Baghdad- Iraq; UoITC is one of governmental universities which established by the Ministry of Higher Education in Iraq. IJCI aims to contribute to the constant scientific research and to provide a sober scientific journal that enriches scholars around the world and it deals with all aspects of computer science.

Loading...
Contact info

Principal Contact
Prof. Dr. Safaa O. Al-mamory,
University of Information Technology and Communications
Baghdad - Iraq
Al-Nidal St. , Near Ibn Al-Haitham Hospital
Email: editor_ijci@uoitc.edu.iq
Phone: 009647802355417

Table of content: 2017 volume:43 issue:1

Article
Corners-based Image Information Hiding Method

Authors: Ahmed Talib
Pages: 1-5
Loading...
Loading...
Abstract

The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method. Advantage of this method over other security methods is hiding existence of data using carrier to hold this data embedding inside it. Image-based information hiding represents one of widely used hiding methods due to the image capability of holding large amount of data as well as its resistance to detectable distortion. In last decades, statistical methods (types of stego-analysis methods) are used to detect existing of hidden data. Therefore, areas that have color variation (edges area) are used to hide data instead of smooth areas. In this paper, Corners points are proposed to hide data instead of edges, this to avoid statistical attacks that are used to expose hidden message. Additionally, this paper proposes clearing least significant bit (CLSB) method to retrieve data from stego-image without sending pixels' map; this will increase security of the proposed cornerbased hiding method. Experimental results show that the proposed method is robust against statistical attacks compared with edge- and sequential-based hiding methods. SVM classifier also confirms the outperformance of the proposed method over the previous methods by using Corel-1000 image dataset.


Article
Blended Learning Using Virtual Reality Environments

Loading...
Loading...
Abstract

Immersive virtual reality isn’t just for gaming. It’s poised to have a big impact on education as well, giving students an opportunity to interact with content in three-dimensional learning environments. Blended learning, according to the Inn sight Institute is "a formal education program in which a student learns at least in part through online delivery of content and instruction with some element of student' control over time, place, path and/or pace". On the other hand, there are many disadvantage found in blended learning such as the learners with low motivation or bad study habits may fall behind, and many others. So, there is an essential need to improve and develop the theory of the blended learning by using virtual reality environments and get rid of these disadvantages to develop the faceto-face learning to add a lot of features such as excitement and make it more efficient. As well as affirms clarity of the scientific content of the lecture that the student may be miss them by absent or even mentally, so student can live atmosphere the lecture again and overcome the difficulties resulting from the using blended learning or traditional learning. Firstly, this approach is applied by building a specialized website application that allow using virtual reality feature in order to measure the effectiveness of this study on students, and then a questionnaires was designed and the information result of these questionnaires impact was gathered. It is found that, the most of students were excited, active and they understand the lecture in an easy way with a high Likert Scale (4.74), but they found difficulties in using VR tools which has a low Likert scale (2.66).


Article
Enhance the Hiding Image by Using Compression and Securing Techniques

Authors: Saif Saad --- Fouad H. Awad --- Ahmed S. Farhan
Pages: 14-16
Loading...
Loading...
Abstract

Information security is a huge trending topic in recent year. Many technique and algorithm were designed and developed to achieve the security of information and/or network across the world. Cryptography is one of the most common tools to provide such security. Nevertheless, steganography also provide a good security by hiding data within a media in a way that an attacker can't sense the presence of the secret data. Compression don't normally imply any security , however , it messes up the original encoding of the data and reduces its size by a measureable amount which makes it perfect for hiding .In this paper a system was proposed where a secret image is compressed before encryption and hiding. JPEG algorithm was used for the compressing, while at the encryption stage RC4 algorithm was used due to its fast processing speed. LSB (Least Significant Bit) technique then applied to hide the secret data within the cover image.

Keywords

Encryption --- RC4 --- Hiding --- Cryptography --- Steganography


Article
The concept of building a model of the national blood information system

Loading...
Loading...
Abstract

The development of modern information technologies in medicine makes actually the creation of the national Information Systems (IS) for joint activities of medical institutions, improve the quality of health services and improve management in the health sector. One of the components of healthcare is the system of Blood Service (BS). In this work the concept of building the national system is considered on example of the IS of BS. The national IS of BS aims to track relevant information on indicators of the quality of blood products through information integration BS establishments, makes it possible to increase the level of infectious safety and quality of transfusion care. The models of integration IS of BS are offered on the conceptual level in this work for information exchange organization between BS establishments. The analysis of structures of models of integrated systems is carried out to select the rational national IS of BS.


Article
Design of Secure Chatting Application with End to End Encryption for Android Platform

Authors: , Ali Makki Sagheer --- Ammar Hammad Ali
Pages: 22-27
Loading...
Loading...
Abstract

In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques. The proposed application used the Elliptic Curve Diffie Hellman Key Exchange (ECDH) algorithm to generate the key pair and exchange to produce the shared key that will be used for t he encryption of data by symmetric algorithms. The proposed Application allows the users to communicate via text messages, voice messages and photos. For the text message security the standard AES algorithm with a 128 bit key are used. The generated key (160 bit) minimized to 128 bit length by selecting the first 128 bit of the generated key in order to be used by the AES algorithm. For the voice and image security processes the proposed application used the symmetric algorithm RC4 for this purpose.


Article
Compression image sharing using DCT- Wavelet transform and coding by Blackely method

Authors: Loay E. George --- Ali H. Ahmed
Pages: 28-39
Loading...
Loading...
Abstract

The increased use of computer and internet had been related to the wide use of multimedia information. The requirement for protecting this information has risen dramatically. To prevent the confidential information from being tampered with, one needs to apply some cryptographic techniques. Most of cryptographic strategies have one similar weak point that is the information is centralized. To overcome this drawback the secret sharing was introduced. It’s a technique to distribute a secret among a group of members, such that every member owns a share of the secret; but only a particular combination of shares could reveal the secret. Individual shares reveal nothing about the secret. The major challenge faces image secret sharing is the shadow size; that's the complete size of the lowest needed of shares for revealing is greater than the original secret file. So the core of this work is to use different transform coding strategies in order to get as much as possible the smallest share size. In this paper Compressive Sharing System for Images Using Transform Coding and Blackely Method based on transform coding illustration are introduced. The introduced compressive secret sharing scheme using an appropriate transform (Discrete cosine transform and Wavelet) are applied to de-correlate the image samples, then feeding the output (i.e., compressed image data) to the diffusion scheme which is applied to remove any statistical redundancy or bits of important attribute that will exist within the compressed stream and in the last the (k, n) threshold secret sharing scheme, where n is the number of generated shares and k is the minimum needed shares for revealing. For making a certain high security level, each produced share is passed through stream ciphering depends on an individual encryption key belongs to the shareholder.

Keywords


Article
Quadcopter Based Object Detection and Localization

Loading...
Loading...
Abstract

This paper presents the development and integration of an X-configuration quadcopter with an IP camera for object detection based on the color of an object. A KK2 microcontroller is used to control the quadcopter movements. The controller has builtin gyros that provide heading rate information, which are used to control the movement of the quadcopter. The parts of the whole UAV are selected and integrated. The calibration processes are handled after installing necessary controller codes. This is to make quadcopter fly smoothly according to its set commands. The IP camera is then attached to the quadcopter frame. Mobile camera with GPS receiver is used for object detection and localization. Images are captured from the IP camera; the three-dimensional position information for the quadcopter is recorded by the GPS receiver, and then the whole data are sent repeatedly from the Mobile to a ground stati on computer via wireless communication link. Two algorithms are next implemented to acquire and analyze the Images received form the IP camera. The results show that the images was captured and analyzed successfully, and the objects were detected according to their color and its approximate position was reported.

Keywords


Article
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain

Loading...
Loading...
Abstract

With development, technology, computer science, computer networks and transmission of multimedia between two or more parts, a security of multimedia becomes an essential issue since most of the systems became easy to attack. In this newspaper, we suggest a model to Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain. The analysis and evaluate the performance of this model is measured by testing several parameters. Show The resulting multimedia is found to be more distorted in hybrid Cipher.

Table of content: volume:43 issue:1