Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount. These methods embed the data in a random location with a random amount, further enhancing the level of obfuscation. A pseudo-random binary key that is generated through a nonlinear combination of eight Linear Feedback Shift Registers (LFSRs) controls this randomness. The experimentation involves various 512x512 cover images. The first method achieves an average PSNR of 43.5292 with a payload capacity of up to 16% of the cover image. In contrast, the second method yields an average PSNR of 38.4092 with a payload capacity of up to 8%. The performance analysis demonstrates that the LSB-based method can conceal more data with less visibility, however, it is vulnerable to simple image manipulation. On the other hand, the DCT-based method offers lower capacity with increased visibility, but it is more robust.
The study has used Geographic Information Systems (GIS) data and Arc GIS software, to produce a new map. This map contains a spatial database of the newly constructed buildings, in the area of water resources engineering college, and using the above tool for updating contains the college in any time, also the map and browse all buildings individually or in clustered, for example, browsing geometric data, statistical data and the plans of drawings, and make any necessary changes to these sectors immediately, or in the future, like the expansion of the study halls by constructed a new floor, or add supplements, prepare any electrical to any building, and anything else. The paper also, updates the old Google Earth image, f
... Show More
The research aims to study the impact of the dimensions of fun in the workplace in achieving internal marketing And knowing the type of relationships That link the dimensions of fun in the workplace With each other, None of the researchers mentioned (to the researcher's knowledge) the link between fun in the workplace and internal marketing From this point of view the main objective is determined, which is to study the effect of fun in the workplace in internal marketing, The research was conducted at Al Salam Public Company for Communications and Information Technology The research community was represented by (308) employees of the aforementioned company , Where a random sample was selected tha
... Show MoreThis research aimed to know the tectonic activity of the Wadi Al-Batin alluvial fan using hydrological and morphotectonic analyses. Wadi Al-Batin alluvial fan is deposited from Wadi Al-Rimah in Saudi Arabia, which extended to Iraqi and Kuwait international boundaries. The longitudinal and transverse faults that characterize this region were common. The Abu- Jir-Euphrates faults have a significant impact on the region. The faults zone consists of several NW- SE trending faults running from the Rutba in western Iraq to the south along the Euphrates through Kuwait and meeting the Al-Batin fault to the Jal Al-Zor fault. The Hydromorphometric analysis of the present fan shows five watersheds having asymmetry shapes, more elongated and activi
... Show MoreThe process of accurate localization of the basic components of human faces (i.e., eyebrows, eyes, nose, mouth, etc.) from images is an important step in face processing techniques like face tracking, facial expression recognition or face recognition. However, it is a challenging task due to the variations in scale, orientation, pose, facial expressions, partial occlusions and lighting conditions. In the current paper, a scheme includes the method of three-hierarchal stages for facial components extraction is presented; it works regardless of illumination variance. Adaptive linear contrast enhancement methods like gamma correction and contrast stretching are used to simulate the variance in light condition among images. As testing material
... Show MoreAs result of exposure in low light-level are images with only a small number of
photons. Only the pixels in which arrive the photopulse have an intensity value
different from zero. This paper presents an easy and fast procedure for simulating
low light-level images by taking a standard well illuminated image as a reference.
The images so obtained are composed by a few illuminated pixels on a dark
background. When the number of illuminated pixels is less than 0.01% of the total
pixels number it is difficult to identify the original object.
The article reflects the results of the analysis of the use of metaphors when creating the image of the main character of the story by D. Rubina "You and me under the peach clouds" - a pet, a dog named Kondraty. Through metaphorization, the image of the dog is filled by the author with purely human qualities, thus passing into the category of a full member of the family. The article is a continuation of the study of the work of D. I. Rubina.
This paper proposed several approaches for estimating the optical turbulence of the Earth’s atmosphere and their effect on solar images’ resolution using ground-based telescopes based on von Kárman, Kolmogorov, and modified von Kárman PSDs models. The results showed a strong correlation coefficient for the modified von Kármán model of atmospheric representation. As can be seen in the case where solar adaptive optics have been properly designed, they typically decrease aberration considerably and provide greatly improved imagery.
Many cinematic adaptations were produced for the Grimms’ “Little Snow-White” (1812) including Mirror Mirror movie (2012), the contemporary version adapted by Taresm Singh. Singh’s version was able to depict the modern reality of women and went against patriarchy by embracing feminist ideologies of the fourth-wave feminism. Therefore, he challenged the ideologies of the mainstream cinema dominated by the patriarchal élite’s capitalist mode of production that still adhere to the stereotyped patriarchal image of women’s ‘victimization,’ ‘objectification’ and ‘marginalization,’ which did not represent women’s modern reality anymore. This paper, however, is a qualitative study aimed to prove that the femini
... Show MoreIn this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.
In recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor
... Show More