Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
Abstract
The current research aims to know the reality of the research's coefficients, to know correlation and effectiveness between the organizational Agility and high performance . The current research has been applied on the official banks , including a sample of senior administration members (120) ; besides , the research has used questionnaire that being considered as the main tool for gathering information and data . It includes 59 questions in addition to the personal interviews program as to support the questionnaire and to fulfill a great deal of reality. It has been anal
... Show MoreGlobal Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufacturers, were fi
... Show MoreThe research aims at shedding light on the impact of the organizational commitment on the performance of the Iraqi insurance company as a service company that provides many services to customers both internal (individuals working) or external, Whenever the company was able to adopt new concepts to increase the understanding and knowledge of how their attention to individuals working and to provide an appropriate working environment, and to clarify the objectives and strategies for them, and create a sense of their importance, as reflected on job performance in attracting new customers, and build long-term relationships with them . In order to achieve this, the research relied on the questionnaire as a main tool for collecting data and in
... Show MoreEvolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show MoreThe convergence speed is the most important feature of Back-Propagation (BP) algorithm. A lot of improvements were proposed to this algorithm since its presentation, in order to speed up the convergence phase. In this paper, a new modified BP algorithm called Speeding up Back-Propagation Learning (SUBPL) algorithm is proposed and compared to the standard BP. Different data sets were implemented and experimented to verify the improvement in SUBPL.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreAim of the research is the study of improving the performance of the thermal station south Baghdad and the main reasons for reduced its efficiency. South Baghdad power planet comprises (6) steam turbine units and (18) gas turbine units .The gas turbine units are composed of two groups: the first group is made up of gas units (1,2), each of capacity (123) MW. The design efficiency of gas turbine units is 32%. The actual efficiency data of steam units is 18.3% instead of 45% which is the design efficiency. The main reason for efficiency reduction of gas units is the rejected thermal energy with the exhaust gases to atmosphere, that are (450-510) ℃.The bad type of fuel used (heavy) fuel. Another reason for the low efficiency and has a neg
... Show More