Preferred Language
Articles
/
URb_kYwBVTCNdQwCl_2O
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers.  The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.

Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Étude des aspects de la peur Dans « La Peste » d'Albert Camus
...Show More Authors

Resumé

La Peste, paru en 1947 et qui reçoit le prix des critiques acquiert a Camus  une notoriété universelle, il reçoit en 1957 le prix Nobel pour une œuvre qui, selon les termes de l’Académie suédoise : « met en lumière les problèmes se posant de nos jours à la conscience des hommes ». A Oran où il n’arrive jamais rien, quelque chose va arriver. On découvre un rat mort, couvert de sang. Deux jours après on en trouve des centaines, puis des milliers. Deux semaines plus tard, un homme meurt d’une maladie, décrite avec précision, mais sans recherche de l’horreur. Après cet événement, on signale une dizaine, puis une vingtaine de cas de fiè

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2016
Journal Name
International Journal Of Engineering Research And Advanced Technology (ijerat)
Speeding Up Back-Propagation Learning (SUBPL) Algorithm: A New Modified Back_Propagation Algorithm
...Show More Authors

The convergence speed is the most important feature of Back-Propagation (BP) algorithm. A lot of improvements were proposed to this algorithm since its presentation, in order to speed up the convergence phase. In this paper, a new modified BP algorithm called Speeding up Back-Propagation Learning (SUBPL) algorithm is proposed and compared to the standard BP. Different data sets were implemented and experimented to verify the improvement in SUBPL.

View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Al–bahith Al–a'alami
CREATIVITY IN THE TELEVISION ADVERTISING MESSAGE AND ITS EFFECTIVENESS IN ATTRACTING THE ATTENTION OF THE RECIPIENT: (A research drawn from a Degree thesis)
...Show More Authors

Declaration has become today has an important and active and influential role in the recipient public life، and are concentrated advertising on the creativity component manufacture to attract his attention toward what to be announced from a variety products، and is dominated by television commercials tempo and imagination، and display them a variety of ways catches the attention and an impressive simulates the their senses of hearing and sight، to influence in the receiver and the public paid for purchase.

Through it crystallization the subject of our research on the importance of creativity in television advertising and effective for attracting the attention of the publi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Encrypted form and content in contemporary designs fabrics and aesthetic implications: زينب عبد علي محسن الزبيدي
...Show More Authors

This research was dealing with the aesthetic impact of encryption in form and content and aesthetic implications in the design of contemporary fabrics. That's where the design of the cloth is linked to the continuous development and continuous innovation and the pursuit of the all-new innovative designs and at the same time an unmarked Cryptographic with semantics and symbols reflect reality aesthetically pleasing and contains four chapters on the research :The first chapter discusses the research problem and its significance is the current quest ( encryption in form and content in contemporary designs fabrics and aesthetic implications ) in that it shows the importance of encryption in the design of fabrics and foundation design configu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Estimation of (S-S) reliability for inverted exponential distribution
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
SBOA: A Novel Heuristic Optimization Algorithm
...Show More Authors

A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Mon Aug 05 2019
Journal Name
Gen. Lett. Math
Building a three-dimensional maritime transport model to find the best solution by using the heuristic algorithm
...Show More Authors

The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an

... Show More
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors