In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe psychological burnout is considered one of dangerous phenomenon’s which appeared in the 70s of the 20th century and suffered by most of the society classes. It is a term which the wide uses and various meaning like emotional, mental, and physical exhaustion and chronic weak exhaustion. The presented research aims t identify the psychological burnout as for the Kindergarten teacher and the differences significance according to the variations (Kindergarten type: private or govern mental). The research sample contains 400 female teachers divided to 170 governmental Kindergarten teachers and 230 private Kindergarten teachers. The researcher prepared a measurement method to measure the psychological burnout for those teachers after
... Show MoreHuge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig
... Show MoreThe research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen
... Show MoreFor many years, the construction industry damages have been overlooked such as unreasonable consumption of resources in addition to producing a lot of construction waste but with global awareness growth towards the sustainable development issues, the sustainable construction practices have been adopted, taking into account the environment and human safety. The research aims to propose a management system for construction practices which could be adopted during constructing different types of sustainable buildings besides formulating flowcharts which clarify the required whole phases of sustainable buildings life cycle. The research includes two parts: theoretical part which generally ,handles the sustainability concepts at construction i
... Show MoreSub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static tim
... Show MoreAbstract:
The research aims to clarify the impact of adopting the IFRS16 financial reporting standard on lease contracts in insurance companies on audit procedures. The change in the classification of lease contracts in the case of adopting the IFRS16 financial reporting standard necessarily requires audit procedures that are compatible with this change. A proposed audit program was prepared, guided by international auditing standards, based on the study of the client's environment and analysis of external and internal risks in the light of financial and non-financial indicators. The researchers reached a set of concl
... Show MoreThis study deals with knowing the public relations activities of the Integrity Commission for the year 2007, knowing the contents of these activities, knowing the contents of the advertisements that it published, whether the contents of the advertisements were convincing, and whether press photographs were used in these advertisements, as well as whether symbols and slogans were used. What language and words were used to address the recipient? 1- What feelings do the contents of advertisements arouse? 2- Research objectives: This research aims to answer the following questions: What are the public relations activities carried out by the Integrity Commission? B: Are the contents of the advertisements published by the Authority convincing to
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.