Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on some of the similarity measures of Steganography.
The integer simulation and development finite impulse response (FIR) filters taking into account the possibilities of their realization on digital integer platforms are considered. The problem statement and solution of multifunctional synthesis of digital FIR filters such a problem on the basis of the numerical methods of integer nonlinear mathematical programming are given. As an several examples, the problem solution of synthesis FIR-filters with short coefficient word length has been given. The analysis of their characteristics is resulted. The paper discusses issues of modeling and synthesis of digital FIR filters with provision for the possibilities of their implementation on digital platforms with integer computation arithme
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreLighting is a very important element of treatment if the color contains many imaging system (digital cameras) and the unit of light and the light within these units are not strong , but usefel when the light is low , in different lighting intensities conditions image quality will not persist good enough and image may become dark or slightly exposed to light which leads to lower the details in image where we can not modify contrast or light ness to compensate thr decrease without losing the light and dark deatials . So we went in this research to study the variation colored texts written on the painting and lighting cases of non –regular ( a few) and different distances . As the diversity of these texts written on the board a
... Show MoreSome structures such as tall buildings, offshore platforms, and bridge bents are subjected to lateral loads of considerable magnitude due to wind and wave actions, ship impacts, or high-speed vehicles. Significant torsional forces can be transferred to the foundation piles by virtue of eccentric lateral loading. The testing program of this study includes one group consists of 3 piles, four percentages of allowable vertical load were used (0%, 25%, 50%, and 100%) with two L/D ratios 20 and 30, vertical allowable load 110 N for L/D = 20 and 156 N for L/D = 30. The results obtained indicate that the torsional capacity for pile group increases with increasing the percentage of allowable vertical load, when the percentage of allowable vertica
... Show MoreBackground: In human life, malnutrition may adversely affect various aspects of growth at different stages of life. Teeth are particularly sensitive to malnutrition. Malnutrition may affect odontometeric measurement involving arch width and length of primary dentition. The aim of this study is to estimate the effect of nutrition on arch width and length dimension measurements among children aged 5 years old. Material and methods: This study was conducted among malnourished group in comparison to well-nourished group matching with age and gender. The present study included 158 children aged 5 years (78 malnourished and 80 well-nourished). The assessment of nutritional status was done by using three nutritional indicators, namely Height-for-a
... Show MoreThis paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting
... Show MoreQuality control charts are limited to controlling one characteristic of a production process, and it needs a large amount of data to determine control limits to control the process. Another limitation of the traditional control chart is that it doesn’t deal with the vague data environment. The fuzzy control charts work with the uncertainty that exists in the data. Also, the fuzzy control charts investigate the random variations found between the samples. In modern industries, productivity is often of different designs and a small volume that depends on the market need for demand (short-run production) implemented in the same type of machines to the production units. In such cases, it is difficult to determine the contr
... Show MoreIn this work, there will be upgraded on the work of (Mahmood and Mahmood , 2018) by finding a general rule of the code for any text made from any number of words by using James e-Abacus Diagram in partition theory
It is doubtless that the sexual place has some common indicators due to the masculine and feminine bodies which may be natural or deviated (homosexual). The female has an act of voice in the imaginary masculine place whereas the male has an act of image recognized in the parental mind in both the secular and sacred place. Those places create different limits and perceptions according to the auditory and visual readings in search of identity, text and body in the feminine dramatic text.
The research includes four chapters; the first, the methodological framework, involves the problem which is centralized in the following enquiry: What is the relationship between the place and the term of
... Show More