Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More2 The benefit of the leave of our time is the leakage and inclusion in the series of narrators of modern.
3 The leave is therefore permissible to narrate the hadeeth or other sciences from a sheik or sheiks, and not
the talk.
4 It is not necessary that the grantee of the leave has studied the student who is the holder of the leave.
5 - in which a great meaning is the sense of the recipient seeking blessing through the link
With attribution to our master Muhammad peace be upon him.
The study investigates the possibility of utilizing public interactive sculptures to enhance physical activity in Saudi Arabia. The paper uses a descriptive-analytical methodology to identify the characteristics of interactive sculptures promoting physical activity in public areas as follows: The size and space of the work area are appropriate to the type of physical activity that is achieved, and the importance of the work site in the city and its relation to the surrounding space, identifying participants at the same time and their relationship to ensure safe interaction, as well as the relationship between the esthetic and intellectual concept of working in the community. The study concludes that three technical proposals were present
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
The purpose of this study was to find out the connection between the water parameters that were examined in the laboratory and the water index acquired from the examination of the satellite image of the study area. This was accomplished by analysing the Landsat-8 satellite picture results as well as the geographic information system (GIS). The primary goal of this study is to develop a model for the chemical and physical characteristics of the Al-Abbasia River in Al-Najaf Al-Ashraf Governorate. The water parameters employed in this investigation are as follows: (PH, EC, TDS, TSS, Na, Mg, K, SO4, Cl, and NO3). To collect the samples, ten sampling locations were identified, and the satellite image was obtained on the
... Show MoreSince the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreValues are penetrating or interfering in the lives of individuals and groups and are connected to them in the sense of life itself, because they are closely linked to the motives of behavior, hopes and goals, and can be said that values are everything. The concept of values is one of the concepts that have received the attention of researchers from different disciplines. This has resulted in a kind of confusion and variation in use from one specialization to the other, and uses multiple uses within one specialization. Therefore, there is no uniform definition of values because they relate to individuals. Individuals differ in many things, such as perception,
... Show MoreThis research aims to introduce the general tax on sales in gordan and the most important concepts related to this type of taxes and identify the most on characteristics and stand on its role in supplying the general budget of the necessary fundig to cover the over head of the state and the factorsinfluencing it and whether such a tax has been able to chieve the desired goals.including in contribute to an important and growing role in puplic revenues or not to be able to achieve these goals through the use of descriptive and analytical technique based on the data and information relevant.wasreached some conclusion and recommendations was most important is that the general sales tax comes in
... Show MoreRecently, wireless communication environments with high speeds and low complexity have become increasingly essential. Free-space optics (FSO) has emerged as a promising solution for providing direct connections between devices in such high-spectrum wireless setups. However, FSO communications are susceptible to weather-induced signal fluctuations, leading to fading and signal weakness at the receiver. To mitigate the effects of these challenges, several mathematical models have been proposed to describe the transition from weak to strong atmospheric turbulence, including Rayleigh, lognormal, Málaga, Nakagami-m, K-distribution, Weibull, Negative-Exponential, Inverse-Gaussian, G-G, and Fisher-Snedecor F distributions. This paper extensive
... Show MoreThis study introduces a highly sensitive trapezium-shaped PCF based on an SPR refractometric sensor with unique design features. The structure of a sensor was designed and analyzed using COMSOL Multiphysics v5.6 based on Finite Element Method (FEM) with a focus on investigating the influence of various geometric parameters on its performance. The two channels were coated with a metallic gold layer to provide chemical stability, and a thin layer of TiO₂ improved the gold's adhesion to the fiber. The findings indicate that the proposed sensor achieves maximum amplitude and wavelength sensitivities of 1,779 RIU⁻¹ and 30,500 nm/RIU, respectively, with corresponding resolutions of 3.2