In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT decomposition via SVD coefficients extracted from DCT-transformed images in the midfrequency band. A content-aware strategy combining Gaussian blurring, Canny edge detection, and zigzag scanning is employed to increase robustness against image processing attacks. The experimental results demonstrate the effectiveness of the proposed approach, which achieves up to a 10.4% improvement in PSNR, an SSIM score of 0.996, and a 0.10% increase in NCC over those of previous methods, which mostly rely on grayscale images. These results reflect the ability of the system to maintain high visual quality while offering strong resilience and security for embedded data in full-color images.
Passes the Arab order moment political precision of disruption and discord and
differences of countless between its components and its parts because of the suffering he
endured and the suffering now from internal disturbances as a result of lack of cohesion
relations intra-and cultural, historical and lack of interaction between these components so
that became the focus of the policies and interests is an unprecedented degree , reduced with
the joint Arab action to the minimum, and began to focus on the interests of special
regulations.
This is with regard suffering internally, but externally the regime Arab Regional is absent the
biggest influence on international decisions because of the courtesies which were ca
DC planar sputtering system is characterized by varying discharge potential of (250-2000 volt) and Argon gas pressures of (3.5×10-2 – 1.5) mbar. The breakdown voltage for silver electrode was studied with a uniform electric field at different discharge distances, as well as plasma parameters. The breakdown voltage is a product of the Argon gas pressure inside the chamber and gab distance between the electrodes, represent as Paschen curve. The Current-voltage characteristics curves indicate that the electrical discharge plasma is working in the abnormal glow region. Plasma parameters were found from the current-voltage characteristics of a single probe positioned at the inter-cathode space. Typical values of the electron temperature an
... Show MoreThe systems cooling hybrid solar uses solar collector to convert solar energy into the source of heat for roasting Refrigerant outside of the compressor and this process helps in the transformation of Refrigerant from the gas to a liquid state in two-thirds the top of the condenser instead of two-thirds the bottom of the condenser as in Conventional cooling systems and this in turn reduces the energy necessary to lead the process of cooling. The system cooling hybrid use with a capacity of 1 ton and Refrigerant type R22 and the value of current drawn by the system limits (3.9-4.2A), the same value of electric current calculated by the system are Conventional within this atmosphere of Iraq, and after taking different readings
... Show MoreThe contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MoreBackground: The long term survival of dental implants is evaluated by the amount of crestal bone loss around the implants. Some initial loss of bone around dental implants is generally expected. There is reason to believe that reflecting a mucoperiosteal flap promotes crestal bone loss in the initial phase after an implant has been inserted. The surgical placement of a dental implant fixture is constantly changing and in recent years, there has been some interest in developing techniques that minimize the invasive nature of the procedure, with flapless implant surgery being advocated. The purpose of this study was to compare the radiographic level of the peri- implant bone after implant placement between traditional flapped surgery and f
... Show MoreLow-level microbial activity due to the production of organic acids is a recognized problem during the initial phase of food waste composting. Increasing such activity levels by adjusting the pH values during the initial composting phase is the primary objective to be investigated. In this study, sodium acetate (NaoAc) was introduced as an amendment to an in-vessel composting system. NaoAc was added when the pH of the compost mixture reached a low level (pH < 5), the addition increased pH to 5.8. This had a positive effect on the degradation of organic materials i.e. the formation of methane gas compared to the results without NaoAc addition.
The results also proved that anaerobic-aerobic in-vessel composting could reduce the
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show More