Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.
Preparation of identical independent photons is the core of many quantum applications such as entanglement swapping and entangling process. In this work, Hong-Ou-Mandel experiment was performed to evaluate the degree of indistinguishability between independent photons generated from two independent weak coherent sources working at 640 nm. The visibility was 46%, close to the theoretical limit of 50%. The implemented setup can be adopted in quantum key distribution experiments carried out with free space as the channel link, as all the devices and components used are operative in the visible range of the electromagnetic spectrum.
ترك السلطان عبدالحميد الثاني بصماتهُ على أخاديد الزمان وعلى خارطة المشرق العربي الخاضع للسيطرة العثمانية أنذاك ، لكونهُ أهم شخصية أسلامية غير عربية واجهت الخطر الصهيوني ومحاولاتهم الإستيطانية في مشرق الوطن العربي ، على الرغم من صعوبة الظروف التي كانت تمر بها الدولة العثمانية داخليا ً وخارجيا ً، بما فيها من أطماع اقتسامها بين الاوربين ولذا سموها بالرجل المريض .
تُعد دراسة أعلام الفكر العربي والإسلامي من أهم الدراسات التاريخية ولا يمكن للأمم المتحضرة أن تنسى علمائها ومفكريها لما لهم من دور كبير في حاضر الأمة ومستقبلها و تاريخنا الإسلامي يحفل بالعديد من العلماء ورجال المعرفة الذين ساعدوا على تقدم ورقي العرب والمسلمين على الأمم الأخرى0
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
In this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detec
... Show MoreFaces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processe
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show Moreأثر استراتيجية التدريس البصري باستخدام الانـفوجرافيك في التحصيل والتفكير البصري لدى طلاب المرحلة المتوسطة فـي مادة الرياضيات
Education received the attention of the monarchy in Iraq, especially after the developments that the country witnessed after Iraq gained independence and joined the League of Nations in 1932 AD in all political, economic and cultural aspects. In this regard, due to its distinguished geographical location, where the atmosphere, the natural environment and the religious and political standing were available, which made it a center of attraction for most Iraqi families and political figures.