Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Chapter One – introduction
Nations managed today to achieve progress in the field of modern technology. Science has changed many beliefs and trendiness that people have held for long time, skills and scientific thinking developed, and made scientific observation and experiment replace narration and taking from others. That is attributed to examining the educational systems searching for the locations of defect, and shortage.
In the light of educational modernizations, many models of teaching incliuding a model for social tracing attributed to Herbart Thelen, which is a model to develop skills of social participation in the democratic process (Al-Khawalda,1993,335).
... Show MoreThe research aims to identify the educational values prevailing in the small kinetic games for the children of Riyadh, and to categorize the educational values of the kinetic games small children Riyadh. The research analyzed the content of a number of small kinetic games that included studied physical education at the two pre-kindergarten and stipulated by the Platform for kindergartens, which is being applied. The content analysis was used by analysts agreement with themselves over time (21) days. The agreement between the external researcher and analyst. The researcher used the Cooper to extract equation lab agreement between the researcher and the outside analyst, has reached agreement on determining factor idea and label values (0.8
... Show MoreFootball has progressed from being a ritual and a celebration to become an amateur sport, a professional sport, and now, increasingly, a commercial sport. In the analysis of football business model, the systemic approach should be adopted. If sport is regarded as one of the business sectors, then the application of business system methodology can be fully justified. The interest to create strong football business system calls for the search of the ways of popularizing football business model and boosting the economic potential of its participants. In the research literature tend to ignore the business processes within the sports business. Besides, the systemic approach in football business is usually limited to p
... Show MoreRights of child in the community crisis Iraqi child model The study aimed to identify the types of violation against children in the Iraqi crisis as well as to develop community coping mechanisms to these violations and promote the rights of the child health psychological , social and legal . the first chapter discusses the research problem and its importance and purpose of the research problem and its importance and purpose of the research and the most important terms in the A- Rights of the child ,B- crisis , chapter 2 rights of the child ensure the historical roots , of children’s rights in the holy quran and the sunnah, and legal rights through the twentieth century and the beginnings of century xx, the se through the twentieth cen
... Show MoreIn recent years, the attention of the international community and intergovernmental and non-governmental organizations has grown into a new dimension of population displacement, called displacement within the country as a result of conflicts and the expansion of tacit groups, using sentences to describe such conflicts as "identity-based conflict", "ethnic conflict" "Sectarian conflict", in an attempt to determine the nature and characterization of those conflicts. In such conflict-stricken conditions, the value of a citizen - a person not directly involved in the conflict - is measured by the potential gains that that person has made to the conflicting parties, as civilians have been indirect victims of military operations, Favor
... Show MoreThe paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show MoreThe Political Thinking Regarded as an important element for the formulation of the stat, weather in its formation, the structure of it s entity, its political system and it s governmental instruments .The political thinking can not act without determined strategy, So they intend to work hard to formulate a railed strategy that make them able to determine its directions to general issues.
The Study aimed to solve the problem through the following question:
1- What are the levels of Political Thinking and Strategic Analysis in the financial ministry?
2- What are the relation ship between the dimensions of Political T
... Show MoreThis paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show MoreEfficient management of treated sewage effluents protects the environment and reuse of municipal, industrial, agricultural and recreational as compensation for water shortages as a second source of water. This study was conducted to investigate the overall performance and evaluate the effluent quality from Al- Rustamiya sewage treatment plant (STP), Baghdad, Iraq by determining the effluent quality index (EQI). This assessment included daily records of major influent and effluent sewage parameters that were obtained from the municipal sewage plant laboratory recorded from January 2011 to December 2018. The result showed that the treated sewage effluent quality from STP was within the Iraqi quality standards (IQS) for disposal and t
... Show More