In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreIn this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution.
Jordan curve theorem is one of the classical theorems of mathematics, it states the following : If is a graph of a simple closed curve in the complex plane the complement of is the union of two regions, being the common boundary of the two regions. One of the region is bounded and the other is unbounded. We introduced in this paper one of Jordan's theorem generalizations. A new type of space is discussed with some properties and new examples. This new space called Contractible -space.
In this study, the concept of fuzzy α-topological vector space is introduced by using the concept fuzzy α-open set , some properties of fuzzy α-topological vector spaces are proved .We also show that the space is -space iff every singleton set is fuzzy α- closed .Finally, the convex property and its relation with the interior points are discussed.
Throughout this paper we study the properties of the composition operator
C
p1 o
p2 o…o
pn induced by the composition of finite numbers of special
automorphisms of U,
pi (z) i
i
p z
1 p z
Such that pi U, i 1, 2, …, n, and discuss the relation between the product of
finite numbers of automorphic composition operators on Hardy space H2 and some
classes of operators.
Theater is a renewed art until this moment, and it does not stray from its components from life and its spaces in general, but rather is derived from them according to characteristics and directions intended to differ based on finding other, more effective solutions, Therefore, the research entitled (Extractive treatments of the space between tradition and contrast in contemporary theater) consists of four chapters. The first chapter came under the title (the methodological framework). Where he dealt with the research problem and then the importance of the research and the goal of the research as well as the objective, temporal and spatial limits of the research, In addition to defining the terminology and then finding the procedural ter
... Show MoreThe elements of theater formation that fall within the spatial experience of the scenography of the show, which the directors work in in the imaginary theater, are important and have an aesthetic, intellectual and cognitive dimension, working to highlight reality in an aesthetic image surrounding space and space. And its relationship to the distinct, multiple and variable spaces above the stage, to produce theatrical signals and endless meanings through the possibility of infinite reconfiguration of the theater's space and its public and private space through the distribution of a group of blocks within the scenic image.
I dealt with in the first chapter (the methodological framework), which includes the research problem identified