With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed user, cannot detect the presence of the secrete data sent. Least Significant Bit (LSB) and Pseudo Random Number Generator (PRGN) are used to hide the secrete data. The Proposed approach is better in PSNR value and Capacity as shown experimentally than existing techniques.
This research deals with the technical configuration of the beautiful visions among Bany Ahmar poets reflected through the incarnation of beautiful artistic images that manifests itself clearly in the combination of two contradictories simultaneously.
The main conclusion is, the Andalusian poets try to use those fictional visions in search of aesthetic pleasure and values, through forming an image from water and fire as two prominent contradicted elements to express the impact of the heat of wine which soon vanishes when it is mixed with water. By this, they show the beautiful side of nature that suggests joy and splendor.
The goal of the research is to highlight the role of the governance and its characteristics in increasing the tax outcome by implementing the laws, regulations and annual controls issued annually from the general authority for taxation for the financing of the general treasury of the state, Additional development and economic capacity, As the search shares a view of the governance and its characteristics and its ideas from increasing tax output. The analytical transparent approach was used by adopting the practice of practicalities of the general authority for tax For quotations in the senior cabinet section ,the revealing of the ongoing operations was relied on the revenue for each financial year, The tools adopted in the process of ana
... Show MoreThis paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreIn this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.
The research deals with the analysis of the city's commercial center using geographic information systems to solve the problem of congestion by evaluating the efficiency and adequacy of car parking lots according to local and Arab standards. Undoubtedly, the importance of car parking areas, as they are not within the desired efficiency within the city, will lead to congestion and traffic becomes very difficult. Thus, the transportation service loses its most important characteristic, which is the ease of movement. Therefore, there has become an urgent need to study and analyze it, as well as to verify the adequacy of the service, and the amount of deficit required to be provided to solve the tra
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More