Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
This research dealt with shedding light on the nature of material misrepresentations, in addition to knowing the extent to which the quality of accounting information systems contributes to reducing material misrepresentations On the theoretical side, a number of sources were relied upon in dealing with the research problem and presentation of the topic, while in the practical side, it was relied on the questionnaire form, where the research sample was (accountants and auditors), where 50 forms were distributed and 50 were received, and the data was analyzed and hypotheses tested through the program Statistical spss to show the relationship between the variables. The research reached a number of conclusions, the most important of which is t
... Show Morehe public federal budget of the state includes estimated figures for state revenues and expenditures for the next fiscal year. The estimation process is one of the main parts of the preparation of the general budget of the state and the accuracy in the estimation of revenues and expenditures of the most important principles that should be based on the process of making estimates and should not overestimate the assessment process to ensure the availability of funds in the future in all cases, which lead to unfair distribution of allocations, so the research aims to study The case of preparing the budget in the Directorate and how to estimate the expenditure in, by the analysis of operating budgets and identify deviations in the implementa
... Show MoreThere is nothing new in saying that Baghdad is the capital of world culture for eight centuries during the Islamic caliphate, it was the Arab book manuscript and copied books worldwide touring most of the capitals of the world
Abstract
The basic aim of this research is to study the interactional effect of investing information technology on the relationship between value added intellectual capital and financial performance as literature review suggested on the theoretical level, including previous studies, with the deduction of its trends strongly predicted by research hypotheses and their content associated with the investment in intellectual capital after information technology tools being employed in this direction to improve the financial performance of the studied companies at the levels of both industrial and service sectors, a non-random sample was chosen included (40) forty Iraqi Joint-Stoc
... Show MoreAn interpretative study of the two-dimensional seismic data of the Afaq area was conducted using the Petrel 2017 software. 2D seismic reflection sections are used to give a structural interpretation of Afaq structure based on synthetic seismogram and well log data. Three reflectors, Zubair, Yamama, and Gotina Formations, were selected. These reflectors are defined from well west kifl (wk-1), Where located adjacent to the study area. Structural maps of the Zubair, Yamama, and Gotnia formations are prepared and interpreted, including TWT maps, Average velocity maps, and depth maps. The studies concluded that the Afaq structure area does not contain main faults, but secondary faults with short and limited extensions
... Show MoreThe current research discusses the topic of the formal data within the methodological framework through defining the research problem, limits and objectives and defining the most important terms mentioned in this research. The theoretical framework in the first section addressed (the concept of the Bauhaus school, the philosophy of the Bauhaus school and the logical bases of this school). The second section dealt with (the most important elements and structural bases of the Bauhaus school) which are considered the most important formal data of this school and their implications on the fabrics and costumes design. The research came up with the most important indicators resulting from the theoretical framework.
Chapter three defined the
In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte
... Show More