Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
The purpose of the search definition on factors superior this whoever impact on the improvement the exploitation decision this detect on stock exchange markets assumption , and using questioners to data accumulate and the Iraq market of financial papers battleground to search annoy chose the eyeball extension (47) peoples from peoples employees on the market , and using the bought statistic program (SPSS) on input and analysis search data , and machinate the search outputs to their group of factors internal and external which impact on exploitation decision on financial papers markets , and the search commend on necessary rise the incumbency direction in the stock exchange
... Show MoreIn all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transfo
... Show MoreAbiotic stress-induced genes may lead to understand the response of plants and adaptability to salinity and drought stresses. Differential display reverse transcriptase – polymerase chain reaction (DDRT-PCR) was used to investigate the differences in gene expression between drought- and salinity-stressed plantlets of Ruta graveolens. Direct and stepwise exposures to drought- or salt-responsive genes were screened in R. graveolens plantlets using the DDRT technique. Gene expression was investigated both in the control and in the salt or drought-stressed plantlets and differential banding patterns with different molecular sizes were observed using the primers OPA-01 (646,770 and 983 pb), OPA-08 (593 and 988 pb), OPA-11 (674 and 831 pb
... Show More