In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
Mechanism of Arbitration in the Stock Exchange Disputes
QJ Rashid, IH Abdul-Abbas, MR Younus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 4
In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreThe problem of the research lies in choosing agility tests suitable to the test taker to observe the relative changes in some players. In addition to that, there are a lot of agility tests that lack special test models that coordinate gender and age. This means the youth basketball player on one hand and time and distance in applying the tests on the other. The importance of the research lies in designing agility tests for youth basketball players to achieve variations in tests a matter that will benefit coaches in their training. The subjects of the research were (30) youth basketball players from the specialized school of the National Center that sponsor gifted basketball players in Baghdad for the season 2014 – 2015. The data was colle
... Show MoreAnger is one of the problems of scientific importance that psychologists and education scientists are interested in, especially societies and educational environments, because if a child’s anger continues to develop into violence, then it becomes an unusual behavior, and an indication of the child's lack of adaptation to his family and his environment (Moses, 2013: 4) &n
... Show MoreClimate change causes water shortage (water scarcity) in addition to the dams built by neighboring countries, which caused a lack of Iraq's water share. Therefore, evaluating the irrigation system requires considering its suitability, adequacy, and efficiency. Irrigation is considered adequate when it maintains water availability within the root zone, and if the amount to be added is determined, irrigation efficiency becomes possible by avoiding water loss. Babil Governorate is considered one of the agricultural governorates in the country that depends on its irrigation from Shatt Al-Hilla. The study area is the Elaj project. Three fields were selected for the project (B1, B2, and B3). These fields are lo
... Show MoreComputers have been used for numerous applications involving the automatic or semiautomatic recognition of patterns in image. Advanced manufacturing system requires automated inspection and test method to increase production and yield best quality of product. Methods are available today is machine vision. Machine vision systems are widely used today in the manufacturing industry for inspection and sorting application. The objective of this paper is to apply machine vision technology for measuring geometric dimension of an automotive part. Vision system usually requires reprogramming or parameterization of software when it has to be configured for a part or product. A web camera used to capture an image of an automotive part that has been ch
... Show More