In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT decomposition via SVD coefficients extracted from DCT-transformed images in the midfrequency band. A content-aware strategy combining Gaussian blurring, Canny edge detection, and zigzag scanning is employed to increase robustness against image processing attacks. The experimental results demonstrate the effectiveness of the proposed approach, which achieves up to a 10.4% improvement in PSNR, an SSIM score of 0.996, and a 0.10% increase in NCC over those of previous methods, which mostly rely on grayscale images. These results reflect the ability of the system to maintain high visual quality while offering strong resilience and security for embedded data in full-color images.
Knowing the Messengers, peace and blessings be upon them, and explaining their obligatory, impossible, and permissible qualities is a legal necessity. It is a rooting of the faith, a means of understanding the Sharia, and a preventer from falling into the scourge of denial and bad manners against them. Therefore, sound belief in their presence is a major reason for the validity of the faith in the aspect of divinity and unseen hearing. Studying the status of prophethood is an urgent necessity in a time in which knowledge is scarce and attachment to the Messenger, may God Almighty’s prayers and peace be upon him, his family, and his companions, is weak, and suspicions and ideas hostile to the faith abound until we begin to hear - unfort
... Show MoreIn this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
The avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels
... Show MoreThe mark at the Children's Theater did not receive as much attention as in the adult theater, despite the great attention given to its visual system, but some of the directors of the Children's Theater approached the application of the same system of marking in the adult theater, without limiting a certain mechanism that identifies the mechanisms of mark operation and the modalities of its transformation in the visual display system, which called on the researcher to shed light in this study on the scientific shift in the visual display system and its functions in the children's theater. The researcher formulated a title for his research (the mark transformation of the visual display system in the chi
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreFor the purpose of achieving the desired goal of the educational learning process, it was necessary to devote attention to educational means and employ them in this field because of their great role in overcoming the difficulties facing the learning process and providing an educational environment that keeps abreast of the scientific developments. This is the goal of the research in which the researchers wanted to know the effect of the educational techniques in the development of apprentice students' skills in teaching.
The research consisted of the problem of the research which is: what is the impact of educational techniques on developing the apprentice students' teaching skills in the Faculty of Fine Arts? In addition to its imp
A Field experiment was conducted in Horticulture and Landscape Department, College of Agricultural Engineering Sciences, University of Baghdad, Al-Jadriah during fall 2019-2020 to study changes in the growth and yield of broccoli grown in the alternative solution ABEER, affected by gas enrichment and spraying with coconut water and moringa aqueous extract under the hydroponic cultivation system. Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is gas enrichment (O2 and O3), Then levels of second factor were randomly distributed within each replicate, which included spra