Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.
The name of princesses Ashraf Bhlwi was associated with very important events influnced on social polical Iranian fact through second half of twentieth century, with access Dr.Mosaddeq to cabinet on May 1951, The conflict seemed between him and princesses Ashraf in creasingly, when Mosaddeq came to authority he had many projects deal with oil industry laws in Iran and reform the elections laws, reducing terms of reference of Al shah and made it honorable only, This matter disturbance Royal court especially, Ashraf, she started to coordinate with members of the shura council and other military personalities in order to over throw Mosaddeq cabinet but she failed because Mosaddeq supported by Irani
... Show MorePurpose: To determine the impact of service encounter in stimulating voluntary customer behaviors.
- Approach / methodology: It was selected a sample of customers Bank Iraqi Trade (TBI) was (105) individual, using a questionnaire designed in the light of previous studies, was drafted scale and tested in the light of a group of statistical methods developed (reliability coefficient, reliability coefficient composite, convergence). Then test hypotheses through structural equation modeling.
- Results: The behaviors and characteristics of the service provider in effect urged bank customers to perform voluntary extra, as the service environment service encounter
The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show Moreحظيت عدد من الشخصيات التاريخية ممن كان لها أثر واضح المعالم في تطور النظام الإداري والسياسي للإمبراطورية المغولية، بأهتمام عدد لا بأس به من الباحثين.
هدف البحث إلى معرفة تقويم الكفاءة الادارية لأعضاء اللجان المشرفة على التطبيقات التدريسية في كليات التربية بجامعة بغداد من وجهة نظر التدريسيين المشرفين عليها. اعتمد البحث المنهج الوصفي التحليلي. وتكون مجتمع البحث من (162) مشرفاً على التطبيقات التدريسية من كليات التربية/ جامعة بغداد، واختيرت عينة البحث بالطريقة العشوائية البسيطة، وبلغ عدد أفراد العينة (120) مشرفاً من الكليات آنفة الذكر. وتم بناء استبانة تضمنت (35)
... Show MoreThe study aims to examine the reality of preparing the Arabic language teacher for non-native speakers by presenting the experience of the Arabic Language Institute at the International University of Africa. Thus, it addresses the following questions: How is it possible to invest the long scientific experiences in proposal and experiment preperations to qualify Arabic language teachers for non-native speakers? What is the reality of preparing an Arabic language teacher at the Institute? How did the Arabic Language Institute process teacher preparation? What are the problems facing the preparation of the Arabic language teachers and the most important training mechanisms used in that Institute?What problems faced the implementation of the
... Show MoreThe search in these subjects makes an importanl accomplishment in the study of the scientific life in that (era) specialy what the wonen had from a scientific and social level in that(age) the studies of the scientestis which were brilliant in the this era never hed the same as the first scientests . because of the common mistakes toward some resesrchers