The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorithm for this research can be divided into two main parts: hidingthe text of the sender, and extracting it by the receiver. Moreover, part can be divided into manyprocedures done by the program Delphi 5. (PDF) A Proposed Technique for Information Hiding Based on DCT.. Available from: https://www.researchgate.net/publication/220419501_A_Proposed_Technique_for_Information_Hiding_Based_on_DCT [accessed Oct 04 2025].
The aim of this research is to study and test the impact of the policy of open-book accounting as one of the cost management mechanisms in achieving the competitive advantage in Jordanian industrial public companies, to achieve the objectives of the study, a field study was conducted by surveying the views of a sample of the accountants of the Jordanian industrial public companies. Hence the arithmetical Means, the Standard Deviations, the Significant Value and the Simple Linear Regression are used to test the research hypotheses and to achieve the research goals. The results of the study showed that there is a statistically significant effect of the policy of open-book accounting as one of the cost management mechanisms in achieving the
... Show MoreThis research aims at identifying the commitment of satellite news channels in Arabic to the set of important standards that reflect their credibility in dealing with the media material, and considering that these channels give special importance to events in Iraq, as well as the Arab region and the world, decide to choose them and study them with a problem The research was a question about the level of credibility of Iraqi media. This research is descriptive research, which used the survey method on an objective sample of 245 items, while the questionnaire was used as a data collection tool. Seven channels were selected in Arabic for the study. The three most watched channels were chosen. These channels included the channels of Russia t
... Show MoreIn this study, from a total of 856 mastitis cases in lactating ewes, only 34 Streptococcus agalactiae isolates showed various types of resistance to three types of antibiotics (Penicillin, Erythromycin and Tetracycline). St. agalactiae isolates were identified according to the standard methods, including a new suggested technique called specific Chromogenic agar. It was found that antibiotic bacterial resistance was clearly identified by using MIC-microplate assay (dilution method). Also, by real-time PCR technique, it was determined that there were three antibiotics genes resistance ( pbp2b, tetO and mefA ). The high percentage of isolate carried of a single gene which was the Tetracycline (20.59%) followed by percentage Penicillin was
... Show MoreNews feeds are at the forefront of news forms that are close to the public's attention for their rapid news content in two directions:
- its speed in summarizing events in one or two sentences easy to be understood and realized.
- highlight the most important contents of screenings or news broadcast.
The researchers felt that the importance of these brief news compared to news broadcast, breaking news and news subtitle are still ambiguous, as well as their contents.
The researchers selected the city of Baghdad as a community to research and prepare a questionnaire form containing (11) questions.
The questionnaires were distributed to a non-relative stratified
... Show Moreهدفت هذه الدراسة إلى تحليل نتائج الاختبار الوطني الموحد الذي تطبقه وزارة التربية والتعليم الفلسطينية في مادة الرياضيات لطلبة الصف الثامن الأساسي في المدارس الحكومية في محافظة طولكرم، وذلك لمعرفة مستوى الطلبة على هذا الاختبار في ضوء متغيرات الجنس والمنطقة التعليمية ونوع المدرسة، ومعرفة علاقة التحصيل على هذا الاختبار بتحصيل الطلبة المدرسي والمعدل العام. ولتحقيق ذلك تم تحليل درجات (3218) طالباً وطالبة؛ وهم ي
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
In this paper, an efficient method for compressing color image is presented. It allows progressive transmission and zooming of the image without need to extra storage. The proposed method is going to be accomplished using cubic Bezier surface (CBI) representation on wide area of images in order to prune the image component that shows large scale variation. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, bi-orthogonal wavelet transform is applied to decompose the residue component. Both scalar quantization and quad tree coding steps are applied on the produced wavelet sub bands. Finally, adaptive shift coding is applied to handle the remaining statistical redundancy and attain e
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreSimple and sensitive batch and Flow-injection spectrophotometric methods for the determination of Procaine HCl in pure form and in injections were proposed. These methods were based on a diazotization reaction of procaine HCl with sodium nitrite and hydrochloric acid to form diazonium salt, which is coupled with chromatropic acid in alkaline medium to form an intense pink water-soluble dye that is stable and has a maximum absorption at 508 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 1-40 and 5-400 µg.ml-1 of Procaine HCl, with detection limits of 0.874 and 3.75 µg.ml-1 of Procaine HCl for batch and FIA methods respectively. The FIA average sample throughput was 70 h-1. A
... Show MoreThis study aims to identify the level of application of blue ocean leadership activities in public organizations and to build a conceptual and cognitive framework around this concept. The study adopted a descriptive-analytical approach, and the research sample consisted of (95) individuals from the senior management working at the center of the Iraqi Ministry of Communications (director general, department manager, section head). The data analysis technique used is structural equation modeling (SEM) and the Statistical Package for the Social Sciences (SPSS). The results indicate that the senior management in the Ministry of Communications is working to adopt the blue ocean leadership style through its activities, but not to the leve
... Show More