Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
In The Name of Allah Most Gracious Most Merciful
It is no secret to everyone that the endowment is an important nucleus for the prosperity of Islamic civilization, especially in the fields of education, health, economy, and defensive military actions that fall within the door of jihad, and so on. Al-Ashraf, Qom Al-Quds, Cairo, and other parts of the Islamic world. What we will see in the research.
The article reflects the results of the analysis of the use of metaphors as one of the main means used by Lyudmila Ulitskaya when writing the novel “Sincerely Yours Shurik” to form the image of the main hero in the novel. The main purpose of the article is to consider metaphors, which helped the author to form the image of the main character Shurik in the text space through the stages of his life path, closely related to the people around him, who is always happy to be useful (hence the title "Sincerely Yours"), among which the female images of his relatives, girlfriends and others stand out as a special layer in the narrative. And in the course of the study, the following tasks were solved: the metaphors that make up the image of the
... Show MoreA total of 48 experiments were conducted to investigate the impact of slit weir dimensions and locations on the maximum scour depth and scour area created upstream. The slit weir model was a 110 mm slit opening, and it was installed at the end of the working section in a laboratory flume. The flume was 10.0 m long, 30 cm wide, 30 cm deep, and almost middle. It includes a 2 m working section with a mobile bed with 110 mm in thickness. In the mobile bed, two types of nonuniform sand (with a geometric standard deviation of 1.58 and 1.6) were tested separately. The weir dimensions and location were changed with flow rates. Then dimensions of the slit weir were changed from 60 x 110 mm to 60 x 70 mm (width x height), while th
... Show MoreThe e-commerce is one of the best achievements of the twentieth century, since the conduct commercial transactions via the Internet may be the consumer easy selection process and purchase convenient manner different from traditional methods, and with the beginnings of the new millennium impose the emergence of e-commerce term significant challenges to the insurance industry as an important economic sectors Generally, and insurance companies in particular as a result of scientific development, which has led to a reduction in costs and innovation in the production, which led to intense competition on both levels local or global. The insurance industry is a vital part of the economy and it has a varied impact to the community and individual
... Show MoreThe research aims to measure the net nominal protection coefficients for the products table eggs and poultry meat and the extent of its impact on domestic production volume for the period of 1990- 2013 has been the use of mathematical formulas simplified in the calculation of the transaction process with a view to the extent of support and protection offered by the state pricing policy for products Resources Sector Animal in Iraq and reach search Highlights and most important, there are volatile price state policy with regard to eggs and poultry meat, as it ranged net nominal protection coefficients between the larger and less than the right one, which means that values are unstable to support local producers or consumers, and can be The
... Show MoreThis work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
Background: Poly (methyl methacrylate) has been widely utilized for fabrication of dentures for many years as it has good advantages but not achieved all demands of the mechanical properties such as low transverse strength, low impact strength, low surface hardness, high water solubility and high water sorption. Material and method: To provide bonding between ZrO2 nanoparticles and PMMA matrix, the ZrO2 Nano-fillers were surface-treated with a saline coupling agent. Plasma surface treatment of polyethylene (PE) fiber was done to change surface fiber by using DC- glow discharge system. For characterization of interring any functional groups, the (FTIR) spectrum were done .then the mechanical properties studied to choose the appropriate perc
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreConjugated Linoleic Acid (CLA) is an essential polyunsaturated omega fatty acid that occurs naturally in vegetable oils. It also plays an important role in preserving meat for longer periods by preventing oxidation of other fats. Thus, it can be used in the production of functional foods with high biological value and low cholesterol levels by adding poultry diets. Objective: The aim of the present study was to evaluate the effect of adding CLA to broiler diets on production performance and fatty acid content in the meat. Methodology: One-day-old Ross-308 chicks were randomly distributed into four dietary treatment groups: control (0 g CLA kgG1 diet; A1), 0.5 g CLA kgG1 diet (A2), 0.75 g CLA kgG1 diet (A3) and 1 g CLA kgG1 diet (A4). Diets
... Show More