
Salwa Shakir BaawiUniversity of Al-Qadisiyah | UAQ · Department of Computer Information Systems
Salwa Shakir Baawi
Doctor of Philosophy in Computer Security (UKM) Malaysisa
I am interested in image & text watermarking and image steganography in image files. Also, I focus on machine learning.
About
52
Publications
9,222
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
58
Citations
Introduction
Salwa Shakir Baawi currently works at the Faculty of Computer Science & Information Technology, University of Al-Qadisiyah, Iraq. Salwa does research in Computer Security/ Steganography and Watermarking.
Additional affiliations
Education
September 2014 - April 2019
September 1997 - October 2000
October 1992 - July 1996
Publications
Publications (52)
يعرض البحث تقويما لأداء مولدات المتتابعات شبه العشوائية وبيان مدى تأثيرها في تشفير الصور الرقمية والأخذ بنظر الاعتبار المعايير الأساسية )طول الدورة ، درجة التعقيد، حجم الصورة ، التدرج اللوني للصورة( المستخدمة في تقويم أداء نوعين من المولدات الخطية واللاخطية في التشفير الانسيابي للصور الرقمية.
The use of strong encryption and hiding techniques is essential for secure digital communication. The aim of this article is to give a thorough study of advanced steganography methods designed especially for embedding information in Arabic text, which may be sensitive in nature and needs to be transmitted securely. This review is focusedon four mai...
Currently, technology has exhibited substantial advancement, resulting in the improvement of communication. Emails are often regarded as the most effective method for both informal and formal communication. Furthermore, individuals utilize email as a means to save and distribute significant data, encompassing textual content, images, documents, and...
Multi-label text classification has grown in popularity in recent years, with each document being assigned numerous categories simultaneously. The Arabic Language has a very complex morphology and a vibrant nature; nonetheless, there needs to be more research on this topic for the Arabic Language. As a result, this study aims to present a method fo...
Steganography is the practice of hiding data, such as images, videos, or text, within a cover image without it being detectable by the human eye. Several factors, such as the capacity, security, and robustness of the technique, are essential when transferring information using this method. In this study, we propose a new approach to image steganogr...
Keywords: information security watermarking text watermarking data hiding categories. A B S T R A C T One of the common vast practices used for text authentication and ownership verification nowadays is through an information-hiding technique known as watermarking, which dates back to the 1990s. This paper investigates digital watermarking and its...
The proposed technique to embed an image watermark in a host image depends on the discrete cosine transform and the Geffe algorithm in this search. The proposed algorithm uses the Geffe algorithm for encryption of the watermark. Discrete cosine transform (DCT) coefficients are then computed by dividing the host image into non-overlapped 8x8 blocks....
The proposed technique to embed an image watermark in a host image depends on the discrete cosine transform and the Geffe algorithm in this search. The proposed algorithm uses the Geffe algorithm for encryption of the watermark. Discrete cosine transform (DCT) coefficients are then computed by dividing the host image into non-overlapped 8x8 blocks....
Image compression depends on data compression of digital images. Its central objective is to decrease the redundancy of the image data for reducing space and the cost of transmitting data in public communication channels. This research suggests a new compression technique based on the statistical rules. The proposed technique is one of the lossy co...
Certificate for Reviewing
Awarded Aug 2020
successfully completed the following module
Structuring your article correctly
Successfully completed the following module
Using proper manuscript language
Certificate of reviewing
Since computer utilization is expanding, for both social and trade ranges, secure communications through channels got to be an exceptionally critical issue. Information hiding away could be a strategy to get a secure communication medium and securing the data amid transmission. Text documents have very less redundant information as compared to the...
التعليم الالكتروني للمرحلة الجامعية في زمن فايروس كورونا
This presentation to increase the knowledge about the Microsoft Excel 2010
Text steganography is regarded as the most challenging carrier to hide secret data with because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues...
Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party)...
One of the common practices applied to ensure secrecy in the modern day is through an information hiding technique known as steganography, which dates back to the ancient Greece. This study investigates digital steganography and its techniques that primarily focus on text steganography. At the same time, it also attempts to present a distinctive cl...
Steganography is a secret writing wherein one person communicates with another without drawing suspicion to the secret communication through the medium. Text steganography is regarded the most difficult carrier to conceal secret data with because of its insufficient redundant information compared to image, audio, or video files. In this paper, we p...
Steganography is a secret writing wherein one person communicates with another without drawing suspicion to the secret communication through the medium. Text steganography is regarded the most difficult carrier to conceal secret data with because of its insufficient redundant information compared to image, audio, or video files. In this paper, we p...
Recognition of secret keys is considered as an important matter for the workers and specialists for analyzing cryptographic algorithms, or for the evaluation of the security of these algorithms. This paper presents a newly proposed method depending on the utilization of window’s technique on the histogram of statistical occurrences of Arabic letter...
Questions
Questions (5)
I am looking for a serious relationship between them?
In order to increase knowledge in an interesting field, we have to know the important tools and techniques of Cybersecurity.
I'm looking to select more features at the same time.
I'm looking for the best measurement factor that can be used to measure the transparency of the image after the embedding process (text in the image).
How can select some techniques to compare in text-based steganography? Have to be selected them in the same classification (category) or not?