The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreNumerical simulations were carried out to evaluate the effects of different aberrations modes on the performance of optical system, when observing and imaging the solar surface. Karhunen-Loeve aberrations modes were simulated as a wave front error in the aperture function of the optical system. To identify and apply the appropriate rectification that removes or reduces various types of aberration, their attribute must be firstly determined and quantitatively described. Wave aberration function is well suitable for this purpose because it fully characterizes the progressive effect of the optical system on the wave front passing through the aperture. The Karhunen-Loeve polynomials for circular aperture were used to
... Show MoreGypsum is one of the important construction materials in Iraq in plastering surfaces and gypsum board , the ability of gypsum to give a comfortable an aesthetic ambiance as a construction material increase the need of gypsum , The particle size , total surface area and particle size distribution were factors affecting plaster properties used for construction properties . In this study gypsum paste was used with different mixing ratios of particle size and studied the physical properties of these types of pastes named (standard consistency ,setting time ,density) and compressive strength . The results showed that the water to gypsum ratio increased with increasing the fineness of the gypsum to (0.75%) and the setting time to the maxi
... Show MoreComputer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead
... Show MoreFacial identification is one of the biometrical approaches implemented for identifying any facial image with the use of the basic properties of that face. In this paper we proposes a new improved approach for face detection based on coding eyes by using Open CV's Viola-Jones algorithm which removes the falsely detected faces depending on coding eyes. The Haar training module in Open CV is an implementation of the Viola-Jones framework, the training algorithm takes as input a training group of positive and negative images, and generates strong features in the format of an XML file which is capable of subsequently being utilized for detecting the wanted face and eyes in images, the integral image is used to speed up Haar-like features calc
... Show MoreIn this work, yttrium oxide particles (powder) reinforced AL-Si matrix composites (Y2O3/Al-Si) and Chromium oxide particles reinforced AL-Si matrix composites (Cr2O3/AL-Si) were prepared by direct squeeze casting. The volume percentages of yttrium oxide used are (4, 8.1, 12.1, 16.1 vol %) and the volume percentages of the chromium oxide particles used are (3.1, 6.3, 9.4, 12.5 vol. %). The parameters affecting the preparation of Y2O3/Al-Si and Cr2O3/AL-Si composites by direct squeeze casting process were studied. The molten Al-Si alloy with yttrium oxide particles or with chromium oxide particles was stirred again using an electrical stirrer at speed 500 rpm and the molten alloy was poured into the squeeze die cavity. Th
... Show MoreSocial media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables