In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT decomposition via SVD coefficients extracted from DCT-transformed images in the midfrequency band. A content-aware strategy combining Gaussian blurring, Canny edge detection, and zigzag scanning is employed to increase robustness against image processing attacks. The experimental results demonstrate the effectiveness of the proposed approach, which achieves up to a 10.4% improvement in PSNR, an SSIM score of 0.996, and a 0.10% increase in NCC over those of previous methods, which mostly rely on grayscale images. These results reflect the ability of the system to maintain high visual quality while offering strong resilience and security for embedded data in full-color images.
In Production and Operations Management the specialists have tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.
The research aims to develop a blu
... Show MoreThe power of the state in Iraq has been influenced by legitimacy, which may have resembled the belt of transmission, affecting the rule of law and social cohesion. The emergence of the political system may have come about as a result of balancing the competing forces within society today as a basis for collective action. The country's march in Iraq was not a result of a series of gradual transitions such as the established ones. For almost a century, there was an extraordinary succession of succession. At each of the three stages of the state there was an internal or external change. They change or disintegrate and others appear. Social and economic conditions may change or the society is exposed to external invasion or our ideas are imp
... Show MoreA Wearable Robotic Knee (WRK) is a mobile device designed to assist disabled individuals in moving freely in undefined environments without external support. An advanced controller is required to track the output trajectory of a WRK device in order to resolve uncertainties that are caused by modeling errors and external disturbances. During the performance of a task, disturbances are caused by changes in the external load and dynamic work conditions, such as by holding weights while performing the task. The aim of this study is to address these issues and enhance the performance of the output trajectory tracking goal using an adaptive robust controller based on the Radial Basis Function (RBF) Neural Network (NN) system and Hamilton
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreThis paper presents new modification of HPM to solve system of 3 rd order PDEs with initial condition, for finding suitable accurate solutions in a wider domain.
Electromyogram (EMG)-based Pattern Recognition (PR) systems for upper-limb prosthesis control provide promising ways to enable an intuitive control of the prostheses with multiple degrees of freedom and fast reaction times. However, the lack of robustness of the PR systems may limit their usability. In this paper, a novel adaptive time windowing framework is proposed to enhance the performance of the PR systems by focusing on their windowing and classification steps. The proposed framework estimates the output probabilities of each class and outputs a movement only if a decision with a probability above a certain threshold is achieved. Otherwise (i.e., all probability values are below the threshold), the window size of the EMG signa
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo
... Show MoreThe accounting system of government is considered an important tool to follow up the financial transactions that reflect the activities of governmental units and by which the useful information for estimating governmental annual revenues and expenditures are provided through the state public budget because it is an information system that provides detailed past performance, as well as measures the efficiency of the governmental agencies performance in implementing the budget, and the of success governmental units is measured through the type of services and programs offered, their size and the possibility of achieving the objectives assigned to them. The medical evacuation program is one of the medical and curative health services provid
... Show More