Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
This research aims to analyze the intellectual and civilizational regression that afflicted Iraqi and Arab society due to political and religious tyranny and internal conflicts, which was reflected in the deterioration of human rights values and the absence of equality and justice in dealing with the other religiously, which affected the reluctance of members of religious groups to interact with their national societies and then migrate to Outside, which contributed to a double loss, in terms of the loss of these societies by productive and effective national competencies, and in terms of distorting the image of Islam. The research stressed that the first treatments of this phenomenon are the consolidation of the values of citize
... Show MoreIn this research was conducted to provide a product to analyze the performance sensor fiber optic used to measure and feel the intensity of the electric field results showed obtained that use sensor long gives reactive high electric field strength and a high value for allergic sensor, but that is at the expense of reducing the intensity of the electric field that is detected
The objective of the research is to measure the impact of social responsibility on the financial performance of the Bank of Baghdad for the period from 2014 to 2016 (3 years) through discussing and analyzing the level of practice of the Bank of Baghdad for social responsibility and the impact on their financial performance during the period. To measure the independent variable (CSR), the researcher used the CSR Disclosure Index and relied on the ROA as an indicator to measure the dependent variable (financial performance).The results of the research showed the main hypothesis of the research, which states that the social responsibility of the banks has no significant impact on the financial performance. In relation to the disclosure of s
... Show MoreAbstract
Shorten the research problem that there is no system or model to evaluate the financial performance of the departments of municipalities where it is not possible for a person or institution both to know or to know their success in terms of the financial work of failure and where it is now than those without assessing the financial performed, authorized to be and necessities FATF is the financial performance assessment, which is the work unfinished aspects without Hence the work came in this study to study and diagnose and analyze financial data in a sample of municipal departments in order to develop a model to assess the financ
With the recent growth of global populations, main roads in cities have witnessed an evident increase in the number of vehicles. This has led to unprecedented challenges for authorities in managing the traffic of ambulance vehicles to provide medical services in emergency cases. Despite the high technologies associated with medical tracks and advanced traffic management systems, there is still a current delay in ambulances’ attendance in times of emergency to provide patients with vital aid. Therefore, it is indispensable to introduce a new emergency service system that enables the ambulance to reach the patient in the least congested and shortest paths. However, designing an effici
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables