One of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the injection of one or two random kashida within the text. Linguistic steganography covers all the techniques that deal with using written natural language to hide secret message. This research presents a linguistic steganography for scripts written in Arabic language, using kashida and Fast Fourier Transform on the basis of a new technique entitled subtraction of two random Images (STRI) as location to hide a secret message. The proposed approach is an attempt to present a transform linguistic steganography using levels for hiding to improve implementation of kashida, and improve the security of the secret message by using subtraction two random Images (STRI). This method was tested in terms of security and capacity, transparency, and robustness and this is way better than previous methods. The proposed algorithms ideal for steganographic properties.
In this work, electrochemical process was presented to polymerized eugenol on Gr.2 and Gr.5 titanium alloys before and after treated by Micro Arc Oxidation (MAO), where Gr.2 is commercial pure titanium and Gr.5 is Ti-6Al-4V dental alloys. The deposited layers were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The adhesion strength of polymeric thin-film was estimation by using pull-off adhesion test and the result was the adhesion strength of PE was (1.23 MPa) on Gr.2 before MAO and increase to (1.98 MPa) on Gr.2 after MAO treatment. The corrosion behavior of Gr.2 and Gr.5 alloy in artificial saliva environment at
... Show MoreThere is no doubt that each of the arts has a material from which the aesthetic achievement is built, so the researcher found that the art of theater, especially the show, whose artistic achievement is based on the body of the actor who emits the formal language (body language), is the focus of interest and active presence, because the body possesses its spiritual qualities that made him and the ability to The formation of things by (his body language), so the researcher studied this theatrical phenomenon and divided it into four chapters. In the first chapter, the research problem included the following question: (Is there a phenomenon of body language in the contemporary theatrical show "Imagine that" as a model) so It is of cognitive
... Show MoreCloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications. This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit
... Show MoreAdvertisement is a general phenomenon in our everyday life. In most cases, it is established for commercial purposes i.e. it is oriented for certain goals and waiting for results. One form of advertisement is a blurb. In this study, the researcher applies Fonton and Saint-Dizier (2010) and Hymes (1962) models on 23 blurbs. These two models are chosen on consideration of accounting grammatical categories and speech events respectively. The study tends to answer the following question: How do blurb’s writers exploit language to convince the reader to buy the intended book? Therefore, the aim of the study can be stated as analyzing the blurbs according to these two models and finding which category scores higher and serves in ad
... Show MoreThe primary goal of the study is to practise some systematic strategies for foreign language instruction despite the fact that no single approach to language classroom instruction is inherently superior to others; instead the choice of an approach should be determined by the teacher, students, the subject matter, and the situation. The paper adopts certain strategies which may assist EFL teachers to excel in their work and continue their professional development. Hence, it is intended for language teachers who understand the value of good teaching and like to produce academically successful students. The study could also help college student teachers to acquire new strategies in order not only to succeed but also to excel in their learni
... Show MoreVoting is an important procedure in democratic societies in different countries, including Iraq. Electronic voting (E-voting) is becoming more prevalent due to reducing administrative costs and burdens. E-voting systems have many restrictions that affect the electoral process. For example, fraud, tampering with ballot boxes, taking many hours to announce results, and the difficulty of reaching polling stations. Over the last decade, blockchain and smart contract technologies have gained widespread adoption in various sectors, such as cryptocurrencies, finance, banking, and most notably in e-voting systems. If utilized properly, the developer demonstrates properties that are promising for their properties, such as security, privacy, trans
... Show MoreIn this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox
... Show More