Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers. The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.
Abstract: A novel design of Mach Zehnder Interferometer (MZI) in terms of using special type of optical fiber that has double clad with graded distribution of the refractive index that can be easily implemented practically was suggested and simulated in this work. The suggested design is compact, rapid, and is simple to be modified and tested. The simulated design contains a MZI of 1546.74 nm of central wavelength that is constructed using special type of double clad optical fiber that has two different numerical apertures. The first aperture will supply single mode propagation via its core, while the second numerical aperture supports a zigzag wave propagation (multimode) in the first clad region. The interferometer’s
... Show MorePhytochemical Screening and Antibacterial Effect of Stevia Rebaudiana (Bertoni) Alcoholic Leaves Extract on Streptococcus Oralis (Dental Plaques Primary Colonizer), Manar Ibrahim
Diabetes mellitus type 2 (T2DM) is a metabolic disorder that influences above 450 million individuals around the world. Type 2 diabetes is a lack of insulin due to pancreatic β-cell malfunction and insulin resistance. This study aimed to detect insulin resistance using homeostasis model assessment (HOMA IR) and determined the correlation with glutathione-s-transferase (GST) activity in T2DM and neuropathy patients as a predictor of oxidative stress, which occurs when the oxidation-antioxidant equilibrium is disrupted. Reactive oxygen species causes vascular injury and a series of inflammation. In the present study, the results show there is no significant difference in diabetic patients (DM) and neuropathy patients (NU) versus healthy p
... Show MoreThe 3-aminoacetophenone and 4-aminoantipyrine were used as precursors to prepare new six ligands. The three new ligands (L1,L2 and L3) were synthesis by reacting one mole of 3-aminoacetophenone with one mole of (Acetyl chloride), (benzoyl chloride), (4-methoxybenzoyl chloride) and ammonium thiocyanat in acetone as a solvent, they are:- L1 (AAA) =[N-(3-acetylphenylcarbamothioyl)acetamide] L2 (BAA) =[N-(3-acetylphenylcarbamothioyl)benzamide] L3 (MAA) =[N-(3-acetylphenylcarbamothioyl)-4-methoxy benzamide] Also three new derivatives of 4-aminoantipyrine were synthesis by reacting one mole of 4-aminoantipyrine with one mole of (Acetyl chloride), (benzoyl chloride), (4-methoxybenzoyl chloride) and ammonium thio
... Show MoreA model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهد
... Show MoreThe search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.