With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious. Since image is frequently compressed for storing and transmission, so steganography must counter the variations caused by loss compression algorithm. This paper describes a robust blind image steganography, the proposed method embeds the secret message without altering the quality by spraying theme on the blocks in the high order bits in color channel s
... Show MoreThis research develops a new method based on spectral indices and random forest classifier to detect paddy rice areas and then assess their distributions regarding to urban areas. The classification will be conducted on Landsat OLI images and Landsat OLI/Sentinel 1 SAR data. Consequently, developing a new spectral index by analyzing the relative importance of Landsat bands will be calculated by the random forest. The new spectral index has improved depending on the most three important bands, then two additional indices including the normalized difference vegetation index (NDVI), and standardized difference built-up index (NDBI) have been used to extract paddy rice fields from the data. Several experiments being
... Show MoreComputer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead
... Show MoreNon Uniform Illumination biological image often leads to diminish structures and inhomogeneous intensities of the image. Algorithm has been proposed using Morphological Operations different types of structuring elements including (dick, line, square and ball) with the same parameters of (15).To correct the non-uniform illumination and enhancement biological images, the non-uniform background illumination have been removed from image, using (contrast adjustment, histogram equalization and adaptive histogram equalization). The used basic approach to extract the statistical features values from gray level of co-occurrence matrices (GLCM) can show the typical values for features content of biological images that can be in form of shape or sp
... Show MoreThe theatrical show depends in its formation on the technical system and the elements that it has for the theatrical show, and among these techniques is the lighting, where every director looked for a style and method of implementing them and giving aesthetic functions and characteristics that give the theatrical show an aesthetic and interpretive dimension, and that is through multiple expressions and connotations of the lighting in giving the show a functional and aesthetic character. Therefore, light has been shed on the lighting and its action in the theatrical show, due to its significant role in the modern theatrical shows. The current research, thus, has been divided into four chapt
... Show MoreThe study aims to implement a serial security technology system to organize a comfortable work environment for users of computers in the General Directorate of Education in Baghdad Karkh3. The most important findings of the study are the application of a serial technology system. It is connected with scientific goals that show the scientific structure of computer learning and its applications. It considers global learning systems and take into account the ease and scientific flow of the class of elderly employees. In addition, employees of other categories, are the outputs of the sequential technological system. The aim is to create a purposeful technological system and keep pace with global developments, to gain experience, skills and
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More