Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
The research aims to shed light on the obstacles that hinder the use of taxpayers' commercial books covered by provisions of the amended commercial book-keeping system No. 2 of 1985 and ways to address these obstacles. On this basis, the main null hypothesis was formulated that there is no statistically significant relationship between the obstacles to the adoption of the commercial books and taxable income.
The research data were collected on the base of three applied case studies of registered taxpayers in the General Commission of Taxes, GCT, together with the use of a questionnaire distributed to a sample of taxpayers ( companies ). The collected data were analyzed, the result were presented and the hypothesis was
... Show MoreThis study examined the relationship between the reporting lag (the timeliness of corporate financial reporting) and several independent variables: (1) Audit reporting lag,(2)Company Size,(3) Profitability of the company,(4)Company Age,(5) Sector Type.(6)Audit’s Opinion,(7) Market Type,(8) Gearing,(9) Concentration of ownership,(10) Audit Firm Size(11)Profit or Loss Company(12) Companies Listed lag on the PEX. In order to achieve the objectives of the study and testing its hypotheses, the data Obtained through actual data of a financial reports, and based on me
... Show MoreThe printing designer's creative thinking is a deliberate mental process based on specific skills that stimulate the motivation of the student to learn and call for new information for the investigation and research to discover the problems and attitudes and through reformulating the experience in new patterns depending on the active imagination and the flexible scientific thinking through providing the largest number possible of various unfamiliar printing design models, and testing their suitability and then readjusting the results with the availability of suitable educational, learning and academic atmosphere.
The designer's creative thinking depends on main skills. Fluency skill is to put t
... Show More
The increase in military spending has become a feature of the times for many countries, including China. They have sought to increase their defence spending, not with the aim of domination and possession, but rather to protect their economic interests and to secure their foreign trade. The research aims to identify the impact of military spending by studying the nature of defence spending and its role in providing security. And stability and facilitating foreign investment in it, as well as storming the military industry, securing some humanitarian supplies, and participating in a variety of public works that can be used in the civil and military fields, and the aim of the research is to id
... Show Moreيهدف البحث إلى تقييم الكفاءة الوظيفية لمؤسسات التعليم الأهلي في أداء وظيفتها بمستوى عالٍ لتشبع حاجة سكان المدينة الذين فضّلوا التعليم الأهلي على التعليم داخل المؤسسات الحكومية مما أدى إلى انتشارها، وصولا إلى أهم الآثار المترتبة على ذلك الانتشار إذ نافست فيه مؤسسات التعليم الحكومي، بل وتنافست المؤسسات الأهلية فيما بينها لتقديم أفضل خدمة تعليمية للصراع من أجل البقاء، وتهدف أيضا إلى إظهار الوجه السلبي ا
... Show MoreThe research tried to show the importance of Administrative Control being one of the important means in administrative work; they work on the review and audit work done and error handling explored in the work and prevent the occurrence and ascertain the extent of implementation of the planned targets, and therefore this is reflected in raising the efficiency of the performance of the tax examiner and complete the work as soon as possible and the highest efficiency and reduce the gaps that may occur between the parties of the tax settling accounts and dealt with in the theoretical side of the search to the research problem, namely with whether operating management oversight to improve the performance and increase the efficiency of t
... Show More