Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on some of the similarity measures of Steganography.
Medical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform w
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.
Game theory problems (GTP) frequently occur in Economy, Business Studies, Sociology, Political Science, Military Activities, and so on are some of the subjects covered. To tackle the uncertainty in Games, the analysis of games in which the payoffs are represented by fuzzy numbers (FN) will benefit from fuzzy set theory (FST).
The purpose of this paper is to develop an efficient technique for solving constraint matrix games (MG) with payoff trapezoidal fuzzy numbers (TFN). The description of the new ranking method is introduced for a constrained matrix with TFN and values. Stock market forecasting has been one of the most important research areas for decades. Stock market values are volatile, non-linear, complicated and ch
... Show MoreIn this research, a mathematical model of tumor treatment by radiotherapy is studied and a new modification for the model is proposed as well as introducing the check for the suggested modification. Also the stability of the modified model is analyzed in the last section.
Some esters were prepared from reaction of different molecular weight of PVA with some acid chloride (prepared by reaction of acid with thionyl chloride or phosphorous pentachloride)in the presence of pyridine. The thermal and reological properties were studied. The increasing Of bulky groups decreasing stability of the thermal and reological properties.
The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.
In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency
... Show MoreFrequently, Load associated mode of failure (rutting and fatigue) as well as, occasionally, moisture damage in some sections poorly drained are the main failure types found in some of the newly constructed road within Baghdad as well as other cities in Iraq. The use of hydrated lime in pavement construction could be one of the possible steps taken in the direction of improving pavement performance and meeting the required standards. In this study, the mechanistic properties of asphalt concrete mixes modified with hydrated lime as a partial replacement of limestone dust mineral filler were evaluated. Seven replacement rates were used; 0, 0.5, 1, 1.5, 2, 2.5 and 3 percent by weight of aggregate. Asphalt concrete mixes were prepared at their
... Show MoreThe Normalization Difference Vegetation Index (NDVI), for many years, was widely used in remote sensing for the detection of vegetation land cover. This index uses red channel radiances (i.e., 0.66 μm reflectance) and near-IR channel (i.e., 0.86 μm reflectance). In the heavy chlorophyll absorption area, the red channel is located, while in the high reflectance plateau of vegetation canopies, the Near-IR channel is situated. Senses of channels (Red & Near- IR) read variance depths over vegetation canopies. In the present study, a further index for vegetation identification is proposed. The normalized difference vegetation shortwave index (NDVSI) is defined as the difference between the cubic bands of Near- IR and Shortwave infrared
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show More