Salwa Shakir Baawi

Salwa Shakir Baawi
University of Al-Qadisiyah | UAQ · Department of Computer Information Systems

Doctor of Philosophy in Computer Security (UKM) Malaysisa
I am interested in image & text watermarking and image steganography in image files. Also, I focus on machine learning.

About

52
Publications
9,222
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
58
Citations
Introduction
Salwa Shakir Baawi currently works at the Faculty of Computer Science & Information Technology, University of Al-Qadisiyah, Iraq. Salwa does research in Computer Security/ Steganography and Watermarking.
Additional affiliations
March 2001 - March 2020
University of Al-Qadisiyah
Position
  • Al-Qadisiyah
Description
  • I joined at University Al-Qadisiyah in 2001. I did many works such as director of computer center, assist of head of a department, and also, head of department. Also, ِI worked as deputy to the dean. I did as head of the multimedia department.
Education
September 2014 - April 2019
National University of Malaysia
Field of study
  • Computer Science
September 1997 - October 2000
University of Babylon
Field of study
  • Computer Science
October 1992 - July 1996
University of Babylon
Field of study
  • Computer Science

Publications

Publications (52)
Article
Full-text available
يعرض البحث تقويما لأداء مولدات المتتابعات شبه العشوائية وبيان مدى تأثيرها في تشفير الصور الرقمية والأخذ بنظر الاعتبار المعايير الأساسية )طول الدورة ، درجة التعقيد، حجم الصورة ، التدرج اللوني للصورة( المستخدمة في تقويم أداء نوعين من المولدات الخطية واللاخطية في التشفير الانسيابي للصور الرقمية.
Article
Full-text available
The use of strong encryption and hiding techniques is essential for secure digital communication. The aim of this article is to give a thorough study of advanced steganography methods designed especially for embedding information in Arabic text, which may be sensitive in nature and needs to be transmitted securely. This review is focusedon four mai...
Conference Paper
Full-text available
Currently, technology has exhibited substantial advancement, resulting in the improvement of communication. Emails are often regarded as the most effective method for both informal and formal communication. Furthermore, individuals utilize email as a means to save and distribute significant data, encompassing textual content, images, documents, and...
Article
Full-text available
Multi-label text classification has grown in popularity in recent years, with each document being assigned numerous categories simultaneously. The Arabic Language has a very complex morphology and a vibrant nature; nonetheless, there needs to be more research on this topic for the Arabic Language. As a result, this study aims to present a method fo...
Article
Full-text available
Steganography is the practice of hiding data, such as images, videos, or text, within a cover image without it being detectable by the human eye. Several factors, such as the capacity, security, and robustness of the technique, are essential when transferring information using this method. In this study, we propose a new approach to image steganogr...
Article
Full-text available
Keywords: information security watermarking text watermarking data hiding categories. A B S T R A C T One of the common vast practices used for text authentication and ownership verification nowadays is through an information-hiding technique known as watermarking, which dates back to the 1990s. This paper investigates digital watermarking and its...
Article
Full-text available
The proposed technique to embed an image watermark in a host image depends on the discrete cosine transform and the Geffe algorithm in this search. The proposed algorithm uses the Geffe algorithm for encryption of the watermark. Discrete cosine transform (DCT) coefficients are then computed by dividing the host image into non-overlapped 8x8 blocks....
Article
Full-text available
The proposed technique to embed an image watermark in a host image depends on the discrete cosine transform and the Geffe algorithm in this search. The proposed algorithm uses the Geffe algorithm for encryption of the watermark. Discrete cosine transform (DCT) coefficients are then computed by dividing the host image into non-overlapped 8x8 blocks....
Article
Full-text available
Image compression depends on data compression of digital images. Its central objective is to decrease the redundancy of the image data for reducing space and the cost of transmitting data in public communication channels. This research suggests a new compression technique based on the statistical rules. The proposed technique is one of the lossy co...
Poster
Full-text available
Number of recommendations
Cover Page
Full-text available
My article reached 40 recommendations
Poster
Full-text available
Good job
Poster
Full-text available
Congratulation
Poster
Full-text available
مؤتمر الكنوز الجامعة
Poster
Full-text available
Certificate for Reviewing Awarded Aug 2020
Poster
Full-text available
successfully completed the following module Structuring your article correctly
Poster
Full-text available
Successfully completed the following module Using proper manuscript language
Article
Full-text available
Since computer utilization is expanding, for both social and trade ranges, secure communications through channels got to be an exceptionally critical issue. Information hiding away could be a strategy to get a secure communication medium and securing the data amid transmission. Text documents have very less redundant information as compared to the...
Poster
Full-text available
Poster
Full-text available
Poster
Full-text available
workshop
Poster
Full-text available
workshop
Poster
Full-text available
workshop
Presentation
Full-text available
التعليم الالكتروني للمرحلة الجامعية في زمن فايروس كورونا
Poster
Full-text available
Workshop
Presentation
Full-text available
This presentation to increase the knowledge about the Microsoft Excel 2010
Chapter
Text steganography is regarded as the most challenging carrier to hide secret data with because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues...
Chapter
Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party)...
Article
Full-text available
One of the common practices applied to ensure secrecy in the modern day is through an information hiding technique known as steganography, which dates back to the ancient Greece. This study investigates digital steganography and its techniques that primarily focus on text steganography. At the same time, it also attempts to present a distinctive cl...
Article
Full-text available
Steganography is a secret writing wherein one person communicates with another without drawing suspicion to the secret communication through the medium. Text steganography is regarded the most difficult carrier to conceal secret data with because of its insufficient redundant information compared to image, audio, or video files. In this paper, we p...
Article
Full-text available
Steganography is a secret writing wherein one person communicates with another without drawing suspicion to the secret communication through the medium. Text steganography is regarded the most difficult carrier to conceal secret data with because of its insufficient redundant information compared to image, audio, or video files. In this paper, we p...
Conference Paper
Full-text available
Recognition of secret keys is considered as an important matter for the workers and specialists for analyzing cryptographic algorithms, or for the evaluation of the security of these algorithms. This paper presents a newly proposed method depending on the utilization of window’s technique on the histogram of statistical occurrences of Arabic letter...

Questions

Questions (5)
Question
In order to increase knowledge in an interesting field, we have to know the important tools and techniques of Cybersecurity.
Question
I'm looking to select more features at the same time.
Question
I'm looking for the best measurement factor that can be used to measure the transparency of the image after the embedding process (text in the image).
Question
How can select some techniques to compare in text-based steganography? Have to be selected them in the same classification (category) or not?

Network

Cited By