The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embedding of several stages of complexity. Also, LSB method via using the whole image is to increase the security and robustness of the proposed method as compared to state-of the-art methods.
KE Sharquie, MM Al-Waiz, AA Al-Nuaimy, Saudi medical journal, 2005 - Cited by 8
Introduction and Aim: The pro-inflammatory cytokine IL-39, a member of the IL-12 family plays a key role in the inflammatory response by modulating immune cell activity and inflammation. A literature search shows no study undertaken for the effect of IL-39's on arthritis so far. Hence, the purpose of this study was to investigate the role of IL-39 in rheumatoid arthritis. Materials and Methods: This study involved 80 patients with rheumatoid arthritis registered at the Rheumatology Clinic at Baghdad teaching hospital. The patients were divided into three groups based on treatments received. Group 1 included patients who were not on any treatment for arthritis, Group 2 with patients on hydroxychloroquine and or prednisone treatment,
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir
... Show MoreIn this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
Construction projects have become a changing dramatically in recent decades and that the goal of the beneficiaries of the implementation of structural project is to complete the work with less time and within the cost of the specific and the best possible quality may sometimes happen that highlights the importance of time on the rest of the items at the implementation of projects for various reasons, including the need to use the project as soon as possible possible change rapidly to customer's requests, but the high cost of the project represents the biggest obstacle for entrepreneurs with its effects on the quality and the time workers, and is a measure of those elements in monetary terms is the key to integration between them, so the
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreThe aim of this paper is to study the nonlinear delay second order eigenvalue problems which consists of delay ordinary differential equations, in fact one of the expansion methods that is called the least square method which will be developed to solve this kind of problems.
In this research, Argon gas was used to generate atmospheric plasma in the manufacture of platinum nanomaterials, to study the resultant plasma spectrum and to calculate the cellular toxicity of those manufactured nanomaterials. This research is keen on the generation of nonthermal atmospheric pressure plasma using aqueous platinum salts (H2PtCl6 6H2O) with different concentrations and exposure of cold plasma with a different time period used to produce platinum nanoparticles, to ensure typical preparation of nanoparticles. Visible UV and X-rays were performed for this purpose, and the diameter of the system probe was (1[Formula: see text]mm) with the Argon gas flow of
... Show More