In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.
Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreThis article aim to estimate the Return Stock Rate of the private banking sector, with two banks, by adopting a Partial Linear Model based on the Arbitrage Pricing Model (APT) theory, using Wavelet and Kernel Smoothers. The results have proved that the wavelet method is the best. Also, the results of the market portfolio impact and inflation rate have proved an adversely effectiveness on the rate of return, and direct impact of the money supply.
Semi-parametric regression models have been studied in a variety of applications and scientific fields due to their high flexibility in dealing with data that has problems, as they are characterized by the ease of interpretation of the parameter part while retaining the flexibility of the non-parametric part. The response variable or explanatory variables can have outliers, and the OLS approach have the sensitivity to outliers. To address this issue, robust (resistance) methods were used, which are less sensitive in the presence of outlier values in the data. This study aims to estimate the partial regression model using the robust estimation method with the wavel
... Show MoreDie Forschung besteht aus zwei Kapiteln: das erste Kapitel geht es nur um die Form des Gedichts, aber das zweite Kapitel geht es um die Analyse des Gedichts, und das ist das Wesen der Arbeit, gleichzeitig enthält das zweite Kapitel auch zwei wichtige Disziplinen.
Die erste Disziplin handelt es sich um die Struktur des Gedichts, nämlich die lyrische Seite; Reim,Rhythmus,Strophe,und Versmaße, aber die zweite Disziplin handelt es sich um den Inhalt, erklärt hier sowohl das Wesen als auch das Ziel des Gedichts, denn das Gedicht besteht aus vier Strophen, die miteinander zu sehr nicht getrennt sind.
Der Dichter beschreibt in erster Strophe die Beziehung zwischen einem Paar, das genau acht Jahre zusammen gelebt hat. Die bei
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreWA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
Wielands Hauptwerk die Geschichte des Agathon (1766/73,1794) ist
der wichtigste Roman der Aufklärungsepoche (1720-1785). Die Verlegung der
Handlung in die Antike widerspiegelt die kulturelle Blüte der vorbildhaften Zeit
zwischen 5. und 4. Jhd. v. Chr.
Beim Lesen des Romans findet man unzählige (über 70) Namen aus der
Antike; von Herrschern, Strategen, Philosophen, Dichtern, Künstlern . . . etc,
woüber man unbedingt informiert werden muss, um deren Zusammenhang in der
Geschichte zu verstehen. Vorübergehend erwähnte Personennamen gibt Wieland
meistens als Beispiel für eine Situation oder ein Verhalten. Dies gab mir den
Anstoß, die wichtigsten Figuren
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More