{"id":10692,"date":"2015-10-31T00:00:00","date_gmt":"2015-10-31T00:00:00","guid":{"rendered":"https:\/\/engineering.uodiyala.edu.iq\/%d9%86%d8%b4%d8%b1-%d8%a8%d8%ad%d8%ab-%d8%b9%d9%84%d9%85%d9%8a-7\/"},"modified":"2023-03-12T03:51:39","modified_gmt":"2023-03-12T03:51:39","slug":"%d9%86%d8%b4%d8%b1-%d8%a8%d8%ad%d8%ab-%d8%b9%d9%84%d9%85%d9%8a-7","status":"publish","type":"post","link":"https:\/\/engineering.uodiyala.edu.iq\/?p=10692","title":{"rendered":"\u0646\u0634\u0631 \u0628\u062d\u062b \u0639\u0644\u0645\u064a"},"content":{"rendered":"<div style=\"font-size: 16px; direction: rtl;\">\n<p dir=\"RTL\" style=\"font-size: 16px; text-align: justify; background-image: initial; background-attachment: initial; background-color: white; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;\"><span style=\"font-family: 'Simplified Arabic';\"><strong>\u0646\u0634\u0631 \u0623\u062d\u062f \u062a\u062f\u0631\u064a\u0633\u064a\u064a \u0642\u0633\u0645 \u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u062d\u0627\u0633\u0628\u0627\u062a \u0648\u0627\u0644\u0628\u0631\u0627\u0645\u062c\u064a\u0627\u062a &ndash; \u0643\u0644\u064a\u0629 \u0627\u0644\u0647\u0646\u062f\u0633\u0629 &ndash; \u062c\u0627\u0645\u0639\u0629 \u062f\u064a\u0627\u0644\u0649 \u0627\u0644\u0645\u062f\u0631\u0633 \u0627\u0644\u062f\u0643\u062a\u0648\u0631<br \/>\n&nbsp;\u0639\u0644\u064a \u062c\u0627\u0633\u0645 \u0639\u0628\u0648\u062f \u0628\u062d\u062b\u0627\u064b \u0639\u0644\u0645\u064a\u0627\u064b \u0628\u0639\u0646\u0648\u0627\u0646 (\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0648\u062b\u0627\u0626\u0642 \u0627\u0644\u0631\u0642\u0645\u064a\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0645\u0631\u0626\u064a\u0650) .<br \/>\n<span style=\"font-size: 14pt; text-align: right;\">\u0641\u064a&nbsp; \u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0627\u0644\u0645\u064a\u0629&nbsp;<\/span><\/strong><\/span><\/p>\n<p dir=\"RTL\" style=\"font-family: 'simplified arabic'; font-size: 16px; text-align: justify;\"><span style=\"font-size: 14pt; font-family: 'Times New Roman', serif;\">((<\/span><strong><span dir=\"LTR\" style=\"font-size: 14pt; font-family: 'Times New Roman', serif;\">International Journal of Engineering Research and General Science<\/span><\/strong><span style=\"font-size: 14pt; font-family: 'Times New Roman', serif;\">))<br \/>\n&nbsp;\u0641\u064a \u062f\u0648\u0644\u0629 \u0627\u0644\u0646\u064a\u0628\u0627\u0644<\/span><\/p>\n<p dir=\"RTL\" style=\"font-size: 16px; text-align: justify; background-image: initial; background-attachment: initial; background-color: white; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;\"><span style=\"font-size: 14pt; font-family: 'Simplified Arabic';\">\u0648\u062a\u0636\u0645\u0646 \u0627\u0644\u0628\u062d\u062b \u062a\u0637\u0648\u064a\u0631 \u0648\u062a\u0635\u0645\u064a\u0645 \u0637\u0631\u0642 \u0644\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u0631\u0642\u0645\u064a\u0629 \u0628\u0627\u0644\u0627\u0639\u062a\u0645\u0627\u062f \u0639\u0644\u0649 \u0627\u0644\u062a\u0634\u0641\u064a\u0631<br \/>\n&nbsp;\u0627\u0644\u0645\u0631\u0626\u064a \u0648\u0637\u0631\u0642 \u0627\u062e\u0641\u0627\u0621 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0645\u0646 \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0645\u062d\u062a\u0645\u0644\u0629 \u0628\u0648\u0627\u0633\u0637\u0629 \u0627\u0644\u0627\u0634\u062e\u0627\u0635 \u0627\u0644\u063a\u064a\u0631 \u0645\u062e\u0648\u0644\u064a\u0646. <br \/>\n\u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0645\u0631\u0626\u064a \u0637\u0631\u064a\u0642\u0629 \u0634\u0627\u0626\u0639\u0629 \u0627\u0644\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u062e\u062a\u0644\u0641 \u0627\u0646\u0648\u0627\u0639 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0631\u0642\u0645\u064a\u0629 \u0641\u064a \u0645\u062e\u062a\u0644\u0641 \u0627\u0644\u0645\u062c\u0627\u0644\u0627\u062a. <br \/>\n\u0648\u0627\u0646 \u0627\u0644\u062a\u062c\u0627\u0631\u0628 \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u062c\u0631\u0627\u0626\u0647\u0627 \u0627\u062b\u0628\u062a\u062a \u0627\u0645\u0643\u0627\u0646\u064a\u0629 \u0647\u0630\u0647 \u0627\u0644\u0637\u0631\u0642 \u0644\u062d\u0645\u0627\u064a\u0629 \u0639\u062f\u0629 \u0645\u0644\u0641\u0627\u062a \u0641\u064a \u0646\u0641\u0633 \u0627\u0644\u0648\u0642\u062a.<\/span><\/p>\n<p dir=\"RTL\" style=\"font-size: 16px; text-align: justify; background-image: initial; background-attachment: initial; background-color: white; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;\"><span style=\"font-family: 'Simplified Arabic';\"><span style=\"font-size: 14pt;\">&nbsp; <\/span><span style=\"font-size: 14pt;\">\u0623\u0645\u0627 \u0627\u0644\u0639\u0646\u0648\u0627\u0646 \u0648 \u0627\u0644\u062e\u0644\u0627\u0635\u0629 \u0628\u0627\u0644\u0644\u063a\u0629 \u0627\u0644\u0627\u0646\u0643\u0644\u064a\u0632\u064a\u0629 :<\/span><\/span><\/p>\n<p style=\"font-family: 'simplified arabic'; font-size: 16px; text-align: justify;\"><strong><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif;\">Protecting Documents Using Visual Cryptography<\/span><\/strong><\/p>\n<p style=\"font-family: 'simplified arabic'; font-size: 16px; text-align: justify;\"><strong><span style=\"font-size: 12pt; font-family: 'Times New Roman', serif;\">Abstract&mdash; Digital documents are produced in enormous amounts everywhere in the digital world. The confidentiality, authenticity and integrity of these documents increased dramatically recently in the insecure networked environments. In this paper, we design new methods based on the visual cryptography and steganography to protect multiple digitized documents from threats created by unauthorized people. Visual cryptography is a visual secret sharing scheme used widely and proved to be secure enough in different areas. The experimental results demonstrate the efficacy of these methods to protect sufficiently multiple digital documents<span dir=\"RTL\">.<\/span><\/span><\/strong><\/p>\n<p dir=\"RTL\" style=\"font-family: 'simplified arabic'; font-size: 16px; text-align: justify; background-image: initial; background-attachment: initial; background-color: white; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;\"><span style=\"font-size: 14pt; font-family: 'Simplified Arabic', serif;\">&nbsp;<\/span><\/p>\n<p dir=\"RTL\" style=\"font-family: 'simplified arabic'; font-size: 16px;\"><span style=\"font-size: 14pt; font-family: Arial;\">\u0648\u064a\u0645\u0643\u0646 \u062a\u062d\u0645\u064a\u0644 \u0627\u0644\u0628\u062d\u062b \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0644\u0631\u0627\u0628\u0637 \u0627\u0644\u0623\u062a\u064a<\/span><\/p>\n<p><span style=\"font-family: Arial; font-size: 14pt;\">http:\/\/pnrsolution.org\/Datacenter\/Vol3\/Issue2\/269.pdf<\/span> <\/p>\n<p><\/p>\n<div style=\"font-family: 'Simplified Arabic'; text-align: center;\"><span style=\"font-family: 'simplified arabic'; font-size: 16px;\"><img decoding=\"async\" alt=\"\" src=\"\/uploads\/hussien\/31-10-2015\/Untitled.jpg\" \/><\/p>\n<p>\n<img decoding=\"async\" alt=\"\" src=\"\/uploads\/hussien\/31-10-2015\/Ali%20J.jpg\" \/><\/p>\n<div style=\"text-align: right;\">\n<\/div>\n<p>http:\/\/www.engineering.uodiyala.edu.iq\/<\/p>\n<p><\/span><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u0646\u0634\u0631 \u0623\u062d\u062f \u062a\u062f\u0631\u064a\u0633\u064a\u064a \u0642\u0633\u0645 \u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u062d\u0627\u0633\u0628\u0627\u062a \u0648\u0627\u0644\u0628\u0631\u0627\u0645\u062c\u064a\u0627\u062a \u2013 \u0643\u0644\u064a\u0629 \u0627\u0644\u0647\u0646\u062f\u0633\u0629 \u2013 \u062c\u0627\u0645\u0639\u0629 \u062f\u064a\u0627\u0644\u0649 \u0627\u0644\u0645\u062f\u0631\u0633 \u0627\u0644\u062f\u0643\u062a\u0648\u0631 \u0639\u0644\u064a \u062c\u0627\u0633\u0645 \u0639\u0628\u0648\u062f \u0628\u062d\u062b\u0627\u064b \u0639\u0644\u0645\u064a\u0627\u064b \u0628\u0639\u0646\u0648\u0627\u0646 (\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0648\u062b\u0627\u0626\u0642 \u0627\u0644\u0631\u0642\u0645\u064a\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0645\u0631\u0626\u064a\u0650) .\u0641\u064a  \u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0627\u0644\u0645\u064a\u0629 ((International Journal of Engineering Research and General Science)) \u0641\u064a \u062f\u0648\u0644\u0629 \u0627\u0644\u0646\u064a\u0628\u0627\u0644<\/p>\n","protected":false},"author":1,"featured_media":10693,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"pmpro_default_level":"","footnotes":""},"categories":[97],"tags":[],"class_list":["post-10692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-97","pmpro-has-access"],"_links":{"self":[{"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/10692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10692"}],"version-history":[{"count":1,"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/10692\/revisions"}],"predecessor-version":[{"id":22482,"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/10692\/revisions\/22482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=\/wp\/v2\/media\/10693"}],"wp:attachment":[{"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/engineering.uodiyala.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}