Preferred Language
Articles
/
URb_kYwBVTCNdQwCl_2O
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers.  The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.

Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Étude des aspects de la peur Dans « La Peste » d'Albert Camus
...Show More Authors

Resumé

La Peste, paru en 1947 et qui reçoit le prix des critiques acquiert a Camus  une notoriété universelle, il reçoit en 1957 le prix Nobel pour une œuvre qui, selon les termes de l’Académie suédoise : « met en lumière les problèmes se posant de nos jours à la conscience des hommes ». A Oran où il n’arrive jamais rien, quelque chose va arriver. On découvre un rat mort, couvert de sang. Deux jours après on en trouve des centaines, puis des milliers. Deux semaines plus tard, un homme meurt d’une maladie, décrite avec précision, mais sans recherche de l’horreur. Après cet événement, on signale une dizaine, puis une vingtaine de cas de fiè

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
Christa Wolfs Erzählung Was bleibt als Auslöser des deutsch-deutschen Literaturstreits
...Show More Authors

Mit dem Fall der Berliner Mauer am 9. November 1989 und dem damit
einhergehenden Verschwinden der DDR aus der politischen Bühne im Jahre 1990
„haben sich nicht nur politische Systeme umgewälzt, sondern auch die Menschen
in ihnen haben ihre Maßstäbe und Perspektiven geändert, unter ihnen Kunstrichter
und Leser.“1 Alles, was bis zum Tag der Wiedervereinigung im Bereich der Kultur
galt, fiel über den Haufen.2 Christa Wolf, die in der DDR eine Leitfigur des
öffentlichen und kulturellen Lebens war und an der Spitze der einflussreichen
Schriftsteller stand, landete im vereinigten Deutschland „immerhin noch auf Platz
25, ein erstaunliches Resultat nach all den Vorwürfen“3, die gegen ihr Werk und
ihre m

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Estimation of (S-S) reliability for inverted exponential distribution
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (15)
Scopus
Publication Date
Wed Oct 01 2014
Journal Name
Al–bahith Al–a'alami
Demonstrators' slogans in Tahrir square (Analytical study of the communication message)
...Show More Authors

The research entitled "The Slogans of Demonstrators at Al-Tahreer Square – analytical study for communicative letters" studies the slogans of demonstrators as a communicative means having many signs reflecting the political, social, cultural relations exist in the minds of people. It is so easy to understand its meaning, examining its goals; and explaining their meanings. For these reasons, we have chosen such a topic. Since the means of communications transfer letters between a sender and receiver, the importance of this research is that it is a researchable trial to acknowledge the issues behind the demonstrators' slogans and the different styles have been chosen by them for a whole year; the different sides of the demonstration sinc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Selection of variables Affecting Red Blood Cell by Firefly Algorithm
...Show More Authors

Some maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
HONOUR " IN SOMERSET MAUGHAM 'S A MAN OF HONOUR MAUGHAM AS A DRAMATIST
...Show More Authors

Somerset Maugham is known mainly as a novelist . This paper presents Maugham the dramatist . Many critics have found him a promising dramatist . He has written 30 plays , then he turns his back upon the theater and writes his autobiographical and most successful novel Of Human Bondage ( 1915) .

        Maugham's writing is clear , precise , and simple . He is described as a realist who is keenly aware of human nature , its concentration and frustration . His only tragedy A Man of Honour is a play in 4 acts . This paper concentrates mainly on this play to show Maugham as a dramatist and to show his concept of " honour " .

     &nb

... Show More
View Publication Preview PDF