Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers. The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.
In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreSomerset Maugham is known mainly as a novelist . This paper presents Maugham the dramatist . Many critics have found him a promising dramatist . He has written 30 plays , then he turns his back upon the theater and writes his autobiographical and most successful novel Of Human Bondage ( 1915) .
Maugham's writing is clear , precise , and simple . He is described as a realist who is keenly aware of human nature , its concentration and frustration . His only tragedy A Man of Honour is a play in 4 acts . This paper concentrates mainly on this play to show Maugham as a dramatist and to show his concept of " honour " .
&nb
... Show MoreWestern Scholars have criticized al the material on the point of reliability . Some have taken the unduly Sceptical view that nothing is to be trusted except Quran . The present study is based on opposing view that at least the material in the early biographers is to be accepted as true , except where there are particular reasons for thinking that an anecdote has been distorted ( or invented ) through legal or political motives. It is also assumed that most of the background material culled from a large number of vaired works , is sound . This standpoint .I would claim , leads to a coherent view of Muhammad's life and achievement.
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreDans le romantisme et ses textes, il est important de mentionner qu'il n'existe qu'un seul thème romantique qui est l'amour, mais assez pour avoir fait du XIXème siècle, une révolution du texte romantique. L'amour consiste à la réduction de l'univers, à un seul être, puis la dilatation de ce seul être, voilà l'amour. cet amour passionnel n'est qu'un arrangement froid et réfléchi excluant d'emblée l'exaltation des sentiments. Néanmoins, cet amour passionnel peut être brutal. quant à la mort, dans le drame romantique, l'amour et la mort sont liés. Beaucoup d'histoires d'amour finissent le plus souvent par un suicide passionnel : le romantique cherche à l'atteindre par l'amour un sentiment sanctifié, et divinisé ; mais c
... Show MoreDans le romantisme et ses textes, il est important de mentionner qu'il n'existe qu'un seul thème romantique qui est l'amour, mais assez pour avoir fait du XIXème siècle, une révolution du texte romantique. L'amour consiste à la réduction de l'univers, à un seul être, puis la dilatation de ce seul être, voilà l'amour. cet amour passionnel n'est qu'un arrangement froid et réfléchi excluant d'emblée l'exaltation des sentiments. Néanmoins, cet amour passionnel peut être brutal. quant à la mort, dans le drame romantique, l'amour et la mort sont liés. Beaucoup d'histoires d'amour finissent le plus souvent par un suicide passionnel : le romantique cherche à l'atteindre par l'amour un sentiment sanctifié, et divinisé ; mais c
... Show MoreAbstract
The project of balad's major sewerage system is one of the biggest projects who is still in progress in salahulddin province provincial - development plan that was approved in 2013 . This project works in two parts ; the 1st is installing the sewerage networks (both of heavy sewerage & rain sewerage) and the 2nd is installing the life – off units (for heavy sewerage & rain sewerage , as well) . the directorate of salahuiddin is aiming that at end of construction it will be able to provide services for four residential quarters , one of the main challenges that project's management experience is how to achieve thes
... Show MoreDBNRHM Sami, International Journal of Research in Social Sciences and Humanities, 2020
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show More