Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
Image contrast enhancement methods have been a topic of interest in digital image processing for various applications like satellite imaging, recognition, medical imaging, and stereo vision. This paper studies the technique for image enhancement utilizing Adaptive Histogram Equalization and Weighted Gamma Correction to cater radiometric condition and illumination variations of stereo image pairs. In the proposed method, the stereo pair images are segmented together with weighted distribution into sub-histograms supported with Histogram Equalization (HE) mapping or gamma correction and guided filtering. The experimental result shows the experimented techniques outperform compare with the original image in ev
... Show MoreIn this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
In this paper, a Monte Carlo Simulation technique is used to compare the performance of MLE and the standard Bayes estimators of the reliability function of the one parameter exponential distribution.Two types of loss functions are adopted, namely, squared error loss function (SELF) and modified square error loss function (MSELF) with informative and non- informative prior. The criterion integrated mean square error (IMSE) is employed to assess the performance of such estimators .
The purpose of this research paper is to present the second-order homogeneous complex differential equation , where , which is defined on the certain complex domain depends on solution behavior. In order to demonstrate the relationship between the solution of the second-order of the complex differential equation and its coefficient of function, by studying the solution in certain cases: a meromorphic function, a coefficient of function, and if the solution is considered to be a transformation with another complex solution. In addition, the solution has been provided as a power series with some applications.
Background: Color stability of glass ionomers (GIs) could be affected by many factors such as pH and consumption of liquid medications like antibiotics. Most common antibiotics used during childhood are amoxicillin suspension (AM.S) and azithromycin suspension (AZ.S) which have acidic and basic pH respectively. Aim: to evaluate and compare the effect of AM.S and AZ.S on color stability of nano resin-modified GI. Methods: Thirty disc of nano resin-modified glass ionomer (2mm height x 4mm diameter) were divided into three groups (n=10 for each) and independently exposed to AM.S, AZ.S, and artificial saliva (A.S.). Color stability was evaluated in triplicate by VITA Easyshade® before and after three immersion protocols, repeated over a thr
... Show MoreIn this research, a group of gray texture images of the Brodatz database was studied by building the features database of the images using the gray level co-occurrence matrix (GLCM), where the distance between the pixels was one unit and for four angles (0, 45, 90, 135). The k-means classifier was used to classify the images into a group of classes, starting from two to eight classes, and for all angles used in the co-occurrence matrix. The distribution of the images on the classes was compared by comparing every two methods (projection of one class onto another where the distribution of images was uneven, with one category being the dominant one. The classification results were studied for all cases using the confusion matrix between ev
... Show MoreIn this research, a group of gray texture images of the Brodatz database was studied by building the features database of the images using the gray level co-occurrence matrix (GLCM), where the distance between the pixels was one unit and for four angles (0, 45, 90, 135). The k-means classifier was used to classify the images into a group of classes, starting from two to eight classes, and for all angles used in the co-occurrence matrix. The distribution of the images on the classes was compared by comparing every two methods (projection of one class onto another where the distribution of images was uneven, with one category being the dominant one. The classification results were studied for all cases using the confusion matrix between every
... Show MoreThe weak and strong forms are so called because it is not their lexical content that primary matter, but the role they have in the sentence. The problematic confusion, our students encounter, in recognizing and producing the correct pronunciation of weak and strong forms of the English function words is the main incentive behind conducting this study. In order to gather the data, this paper used two types of tests: a recognition test and a production test. The general results reached through the analysis of the students' answers seem to conform to the researcher's assumption: students face a critical problem in recognizing and producing correct pronunciation of the weak and strong forms of the English funct
... Show MoreThis paper discusses reliability of the stress-strength model. The reliability functions ð‘…1 and ð‘…2 were obtained for a component which has an independent strength and is exposed to two and three stresses, respectively. We used the generalized inverted Kumaraswamy distribution GIKD with unknown shape parameter as well as known shape and scale parameters. The parameters were estimated from the stress- strength models, while the reliabilities ð‘…1, ð‘…2 were estimated by three methods, namely the Maximum Likelihood, Least Square, and Regression.
A numerical simulation study a comparison between the three estimators by mean square error is performed. It is found that best estimator between
... Show More