Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
Zinc-air fuel cells (ZAFCs) are a promising energy source that could compete with lithium-ion batteries and perhaps proton-exchange membrane fuel cells (PEMFCs) for next-generation electrified transportation and energy storage applications. In the present work, a flow-type ZAFC with mechanical rechargeable was adopted, combined with an auxiliary cell (electrolyzer) for zinc renewal and electrolyte recharge to the main cell. In this work a practical study was performed to calculate the cell capacity (Ah), as well as study the electrolysis cell efficiency by current efficiency, and study the effective parameters that have an influence on cell performance such as space velocity and current density. The best parameters were selected to
... Show More
The idea of this research is the basis of the role exercised by the dimensions of performance management (Performance Planning- performance evaluation- improve the performance and development- feedback - Review and Performance Monitor) In order to achieve the success Organizational Is through the (strategic vision- the operational activity- development of the company- selection of personnel- the company's culture- Leadership and Management- Personal Development - Assessment and Review).And The research aims to identify the extent of the responsibility of performance management in achieving success Organizational through main hypotheses branched out by the sub-hypotheses to knowing out the&nbs
... Show MoreThe research aims to investigate the relationship and impact of e-governance as an independent variable in achieving creative performance as a dependent variable. These variables have been studied in the Directorate of Passports Affairs, and seek to come up with a set of recommendations that help in promoting e-governance in the researched organization, and the researcher adopted the descriptive-analytical approach, included The sample (122) of the total (194) individuals distributed in several administrative levels (officers, associates, and administrative staff). By adopting the questionnaire, which included (49) paragraphs as the main tool for the collection of data and information, as well as personal interviews and field obs
... Show MoreAbstract
The research aims to shed light on the extent to which the practices of performance management in achieving organizational excellence in one of the formations and the Ministry of Finance (GCT). The importance of the selection of these organizations is that they occupies a large and exceptional importance in the national economy through income redistribution add it to cover a large part of the state budget revenues, these organizations possess functionally diverse cadre of them pregnant initial certification and other senior and he fairly stable To meet this target, and on the basis of the data search exploratory researcher built model hypothesis for the search included variable impressionist and
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreMany purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show More