Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
Abstract of the research:
This research sheds light on an important phenomenon in our Arabic language, which is linguistic sediments, and by which we mean a group of vocabulary that falls out of use and that native speakers no longer use it, and at the same time it happens that few individuals preserve the phenomenon and use it in their lives, and it is one of the most important phenomena that It should be undertaken and studied by researchers; Because it is at the heart of our huge linguistic heritage, as colloquial Arabic dialects retain a lot of linguistic sediments, and we usually find them at all levels of language: phonetic, banking, grammatical and semantic. In the
... Show MoreThere are many studies that discussed the famous museum's graveyards in the Islamic worlds, to study the lives of these figures, there are many difficulties for their studies because the first we need the regularity and history information, and many sciences support, such as in language, geography information.
I am studying the research from Maraqid Al-Maaraf book by Harz Aldeen, the book has large members about the persons have graved in Persian Country in the middle ages, there are more than (30) figures in my study, I have studied every figure in this research depending on the sources and references books.
The current research aims to examine the effect of the rapid learning method in developing creative thinking among second-grade female students in the subject of history. Thus, the researcher has adopted an experimental design of two groups to suit the nature of the research. The sample of the study consists of (36) randomly selected students from Al-Shafaq Secondary School for Women, which are divided randomly into two groups. The first group represents the experimental; it includes (31) students who studied the subject of history using the quick learning method. The second group, on the other hand, is the control group, which consists of (32) students, who studied the same subject using the traditional way. Before starting with the exp
... Show MoreThe current study aimed to determine the relation between the lead levels in the blood traffic men and the nature of their traffic work in Baghdad governorate. Blood samples were collected from 10 traffic men and the age about from 20-39 year from Directorate of Traffic Al Rusafa/ Baghdad and 10 samples another control from traffic men too with age 30-49 year and they livedrelatively in the clear cities or contained of Very few traffic areas. The levels of lead in blood estimated by used Atomic Absorption Spectrometry.
The result stated that there is no rising of the levels of lead in blood of traffic men Lead concentration was with more a range from 14 ppm in Traffic police are not healthy They are within the permissible limits, Ap
Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show MoreSteganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b
... Show MoreThe present study aimed to examine the concordance between FISH/CISH techniques for assessment of amplification of her2neu gene in Iraqi breast carcinoma patients. Seventy four (74) Iraqi breast cancer patients were involved at the study from the Histopathology Department at the Central Public Health Laboratory in Bagdad, Iraq. Amplification of HER2neu was detected in (33.8%) by fluorescence in situ hybridization and (13.51%) showed high amplification by chromogenic in situ hybridization and (32.43%) showed low amplification. The results of chromogenic in situ hybridization were significantly correlated with the results of two-color fluorescence in situ hybridization with the same tumors. In addition, the study involved the correlation betw
... Show MoreThe increase in cloud computing services and the large-scale construction of data centers led to excessive power consumption. Datacenters contain a large number of servers where the major power consumption takes place. An efficient virtual machine placement algorithm is substantial to attain energy consumption minimization and improve resource utilization through reducing the number of operating servers. In this paper, an enhanced discrete particle swarm optimization (EDPSO) is proposed. The enhancement of the discrete PSO algorithm is achieved through modifying the velocity update equation to bound the resultant particles and ensuring feasibility. Furthermore, EDPSO is assisted by two heuristic algorithms random first fit (RFF) a
... Show More