Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount. These methods embed the data in a random location with a random amount, further enhancing the level of obfuscation. A pseudo-random binary key that is generated through a nonlinear combination of eight Linear Feedback Shift Registers (LFSRs) controls this randomness. The experimentation involves various 512x512 cover images. The first method achieves an average PSNR of 43.5292 with a payload capacity of up to 16% of the cover image. In contrast, the second method yields an average PSNR of 38.4092 with a payload capacity of up to 8%. The performance analysis demonstrates that the LSB-based method can conceal more data with less visibility, however, it is vulnerable to simple image manipulation. On the other hand, the DCT-based method offers lower capacity with increased visibility, but it is more robust.
The integral transformations is a complicated function from a function space into a simple function in transformed space. Where the function being characterized easily and manipulated through integration in transformed function space. The two parametric form of SEE transformation and its basic characteristics have been demonstrated in this study. The transformed function of a few fundamental functions along with its time derivative rule is shown. It has been demonstrated how two parametric SEE transformations can be used to solve linear differential equations. This research provides a solution to population growth rate equation. One can contrast these outcomes with different Laplace type transformations
The linear segment with parabolic blend (LSPB) trajectory deviates from the specified waypoints. It is restricted to that the acceleration must be sufficiently high. In this work, it is proposed to engage modified LSPB trajectory with particle swarm optimization (PSO) so as to create through points on the trajectory. The assumption of normal LSPB method that parabolic part is centered in time around waypoints is replaced by proposed coefficients for calculating the time duration of the linear part. These coefficients are functions of velocities between through points. The velocities are obtained by PSO so as to force the LSPB trajectory passing exactly through the specified path points. Also, relations for velocity correction and exact v
... Show MoreA new Turbidimetric method characterized by simplicity, accuracy and speed for determination of iron(III) in drug samples by continuous flow injection analysis. The method was based on the formation of complex for iron(III) with 8-hydroxyquinoline in presence of ammonium acetate as a medium for the formation of deep green precipitate and this precipitate was determined using homemade Linear Array Ayah-5SX1-T-1D continuous flow injection analyser. The optimum parameters were 2.6 mL.min-1 flow rate using H2O as a carrier, 1.9 mL.min-1 (14 mmol.L-1) ammonium acetate, 2.4 mL.min-1 (14 mmol.L-1) 8-hydroxyquinoline, 60 L sample volume and open valve for the purge of the sample segment. Data treatment shows that linear range 0.1-8.0 mmol.L-1
... Show MoreA new turbidimetric-flow injection method is described for the determination of chlorpromazine HCl in pure and pharmaceutical preparation. The method is characterized by simplicity, sensitivity and fast, it is based on formation of ion pair compound between chlorpromazine HCl and Potassium hexacyanoferrate(III) in an acid medium for the formation of greenish yellow precipitate. This precipitate was determined using homemade Linear Array Ayah 5SX1-T-1D continuous flow injection analyser. Optimum concentrations of chemical reactants, physical instrumental conditions have been investigated. The linear dynamic range of chlorpromazine HCl was 3-30 mmol.L-1 while correlation coefficient (r) was 0.9929 and percentage linearity (%r2) C.O.D was 9
... Show MoreHuge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig
... Show Moreيهدف هذا البحث الى التطرق الى صورة العربي كما يعرضها ادب اليافعين العبري في رواية " نادية " للكاتبة العبرية " كاليلا رون فيدر " . والتي تعد من الاديبات العبريات اللواتي تطرقن بصورة مباشرة الى موضوع ما خلف الجدار ، والصراع العربي – الإسرائيلي وانعكاساته على المجتمع الإسرائيلي بصورة عامة والمجتمع العربي بصورة خاصة . ينقسم هذا البحث إلى ثلاثة فصول، تطرق الفصل الأول إلى "ادب اليافعين"، و تاريخه ، مميزاته والفئ
... Show MoreEmails have proliferated in our ever-increasing communication, collaboration and
information sharing. Unfortunately, one of the main abuses lacking complete benefits of
this service is email spam (or shortly spam). Spam can easily bewilder system because
of its availability and duplication, deceiving solicitations to obtain private information.
The research community has shown an increasing interest to set up, adapt, maintain and
tune several spam filtering techniques for dealing with emails and identifying spam and
exclude it automatically without the interference of the email user. The contribution of
this paper is twofold. Firstly, to present how spam filtering methodology can be
constructed based on the concep
The present research aims at revealing the advertising image semiotics in the American printed poster by following the image's significance and its transformations through the poster design trends and indicating its nature whether it is an explicit or implicit image. The limits of the research were the American printed poster during 2016-2018 period. The theoretical side was determined by two sections, the first: (the advertising image semiotics) and the second (design trends in the printed poster). The research procedures were represented by the research method adopted in the analysis of the sample models identified in four models taken from the research community which contains (24) models. The selection was made according to the trend
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreRecognizing cars is a highly difficult task due to the wide variety in the appearance of cars from the same car manufacturer. Therefore, the car logo is the most prominent indicator of the car manufacturer. The captured logo image suffers from several problems, such as a complex background, differences in size and shape, the appearance of noise, and lighting circumstances. To solve these problems, this paper presents an effective technique for extracting and recognizing a logo that identifies a car. Our proposed method includes four stages: First, we apply the k-medoids clustering method to extract the logo and remove the background and noise. Secondly, the logo image is converted to grayscale and also converted to a binary imag
... Show More