Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreOne of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the in
Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreIn this study, we try to deviate from the traditional methods of preserving fish. The research depends on finding alternative modern methods by which fish bodies can be preserved in a better way and for long periods after conducting some laboratory treatments on the specimens to ensure obtaining clean and clear samples suitable for diagnosis and study, in addition to keeping it in a new, lightweight and elegant form that can give three-dimensional shapes to the specimens. The final specimens were of high quality and unbreakable durability with high clarity and transparency and low manufacturing costs. This study is the first of its kind.
As of late, humankind has experienced radiation issues either computerized tomography (CT) or X-rays. In this investigation, we endeavor to limit the effect of examination hardware. To do this the medical image is cropping (cut and zoom) then represented the vascular network as a graph such that each contraction as the vertices and the vessel represented as an edges, the area of the coagulation was processed already, in the current search the shortest distance to reach to the place of the blood vessel clot is computed
Let R be a semiprime ring with center Z(R) and U be a nonzero ideal of R. An additive mappings are called right centralizer if ( ) ( ) and ( ) ( ) holds for all . In the present paper, we introduce the concepts of generalized strong commutativity centralizers preserving and generalized strong cocommutativity preserving centralizers and we prove that R contains a nonzero central ideal if any one of the following conditions holds: (i) ( ) ( ), (ii) [ ( ) ( )] , (iii) [ ( ) ( )] [ ], (iv) ( ) ( ) , (v) ( ) ( ) , (vi) [ ( ) ( )] , (vii) ( ) ( ) ( ), (viii) ( ) ( ) for all .
In this paper, we introduce the concept of generalized strong commutativity (Cocommutativity) preserving right centralizers on a subset of a Γ-ring. And we generalize some results of a classical ring to a gamma ring.
This paper comprises the design and operation of mono-static backscatter lidar station based on a pulsed Nd: YAG laser that operates at multiple wavelengths. The three-color lidar laser transmitter is based on the collinear fundamental 1064 nm, second harmonic 532 nm and a third harmonic 355nm output of a Nd:YAG laser. The most important parameter of lidar especially daytime operations is the signal-to-noise ratio (SNR) which gives some instructions in designing of lidar and it is often limit the effective range. The reason is that noises or interferences always badly affect the measured results. The inversion algorithms have been developed for the study of atmospheric aerosols. Signal-to-noise ratio (SNR) of three-color channel re
... Show More