Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods in terms of average segmental SNR, number of failing samples, and Czekanowski Distance (CZD). In addition, the proposed method shows the ability to operate with large message sizes (up to half of carrier size) with graceful degradation as opposed to the other methods which fail at large message size. So, the proposed method provides more flexibility in message and carrier sizes while preserving high efficiency.
Empirical research in the disciplines of art and design has started to escalate and gather consideration within the academic community over the past few decades. However, still, graphic design tends to be a topic extremely under-researched by scholarly persons. Profound research in the field of graphic design extends far beyond the works produced by the designer himself (Khoury, 2009, p.844). In order to develop a clear insight, one needs to delve deep into the subcategories that the diverse field of graphic design is comprised of, including illustration, typography, interaction design, branding and even the impact of notable, eminent institutes from around the world that have taken the budding artists for quite a long time (Walke
... Show MoreParties as active units in this process in order to work must have access to sources of funding in order to maintain their political presence in society and participate in the process of electoral competition, To win the election, bolstering the huge role that money has played in influencing the principle of equality among contestants in the elections. Those who own money will have a greater chance of winning the elections while less competitive opportunities for others who do not own the money or what they own does not give them the competitive ability to win elections. From this point of view, controlling political finance through legal regulation and institutional, media and popular monitoring has become an important requirement
... Show MoreThis research aims to analyze the impact of effective manufacturing strategy on total productive maintenance. Effective manufacturing focuses on improving product quality, increasing productivity, and reducing costs, while total productive maintenance focuses on maintaining machines and equipment in good operational condition and high efficiency. The research seeks to understand how to achieve integration between these two dimensions to achieve excellent performance in manufacturing operations. The study was conducted using the General Company for Battery Manufacturing as a research community, with a sample size of 60 individuals. The research found significant results, including the fact that using an effective manufacturing strategy leads
... Show MoreIn this research, the effect of changing the flood level of Al-Shuwaija marsh was studied using the geographic information systems, specifically the QGIS program, and the STRM digital elevation model with a spatial analysis accuracy of 28 meters, was used to study the marsh. The hydraulic factors that characterize the marsh and affecting on the flooding such as the ranks of the water channels feeding the marsh and the degree of slope and flat areas in it are studied. The area of immersion water, the mean depth, and the accumulated water volume are calculated for each immersion level, thereby, this study finds the safe immersion level for this marsh was determined.
In this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreIn this work, we study several features of the non-zero divisor graphs (ℵZD- graph) for the ring Zn of integer modulo n. For instance, the clique number, radius, girth, domination number, and the local clustering coefficient are determined. Furthermore, we present an algorithm that calculates the clique number and draws the non-zero divisor for the ring Zn.