Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
In this paper, we propose an approach to estimate the induced potential, which is generated by swift heavy ions traversing a ZnO thin film, via an energy loss function (ELF). This induced potential is related to the projectile charge density, ρq(k) and is described by the extended Drude dielectric function. At zero momentum transfer, the resulting ELF exhibits good agreement with the previously reported results. The ELF, obtained by the extended Drude model, displays a realistic behavior over the Bethe ridge. It is observed that the induced potential relies on the heavy ion velocity and charge state q. Further, the numerical results show that the induced potential for neutral H, as projectile, dominates when the heavy ion velocity is less
... Show MoreBackground: Powerlifters and bodybuilders use anabolic androgenic steroids (AAS) especially – as many as 55 percent of elite powerlifters admitted using these agents. In contrast to numerous documented toxic and hormonal effects of AAS their impact on the structure and function of the left ventricular (LV) was not yet fully understood.
Kidney tumors are of different types having different characteristics and also remain challenging in the field of biomedicine. It becomes very important to detect the tumor and classify it at the early stage so that appropriate treatment can be planned. Accurate estimation of kidney tumor volume is essential for clinical diagnoses and therapeutic decisions related to renal diseases. The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of kidney tumors that addresses the challenges of accurate kidney tumor volume estimation caused by extensive variations in kidney shape, size and orientation across subjects.
In this paper, have tried to implement an automated segmentati
The mark at the Children's Theater did not receive as much attention as in the adult theater, despite the great attention given to its visual system, but some of the directors of the Children's Theater approached the application of the same system of marking in the adult theater, without limiting a certain mechanism that identifies the mechanisms of mark operation and the modalities of its transformation in the visual display system, which called on the researcher to shed light in this study on the scientific shift in the visual display system and its functions in the children's theater. The researcher formulated a title for his research (the mark transformation of the visual display system in the chi
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
Image processing applications are currently spreading rapidly in industrial agriculture. The process of sorting agricultural fruits according to their color comes first among many studies conducted in industrial agriculture. Therefore, it is necessary to conduct a study by developing an agricultural crop separator with a low economic cost, however automatically works to increase the effectiveness and efficiency in sorting agricultural crops. In this study, colored pepper fruits were sorted using a Pixy2 camera on the basis of algorithm image analysis, and by using a TCS3200 color sensor on the basis of analyzing the outer surface of the pepper fruits, thus This separation process is done by specifying the pepper according to the color of it
... Show MoreThere are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Digital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple
... Show MoreRecently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show Moreالحمدُ للهِ رب العالمين ، والصلاة والسلام على نبيه الأمين محمد r وعلى آله الطيبين الطاهرين ، وأصحابه الغر الميامين:
تعد الصورة السمعية مفهوما بيانيا نجده في البلاغة العربية واضحاً مؤثرا، مؤديا دورا جوهريا في إيصال الفكرة التي يروم الأديب إيصالها إلى المتلقي ولا تبدو السمعية واضحة إلاّ إذا نظر إليها في حالة أدبيه تهز كيان الشاعر  
... Show More