In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
The research aims to employ one of the most important strategies for recovery from the crisis of the Covid-19 pandemic, which ravaged the economies of the entire world and its various sectors, including the banking sector, through financial technology that is based on digital transformation to achieve financial sustainability and the creation of innovative financial value chains in light of the decline in the banking sector as a result of The negative effects of the Covid-19 pandemic, be guided by the relevant international accounting standards to control the risks associated with financial technology. To recover from the Covid-19 crisis, the research came out with a set of recommendations, most notably financial technology from
... Show MoreTHE ROLE OF ELECTRONIC-PAYMENT SERVICE PROVIDERS IN THE DEVELOPMENT OF E-BANKING IN IRAQ - AN APPLIED RESEARCH IN CENTRAL BANK OF IRAQ
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.
To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system while the second represents the period of time that followed
The research found a number of conclusions but the mo
... Show MoreMany studies and researchers have reported significant evidence that some physical properties of water can be changed as it passes through a magnetic field that can improve water use. This can have a promising potential for applications, especially in the fields of irrigation and drainage. In this research, magnetized water was used to leach salt-affected sandy loam soil. A test rig was designed and constructed to investigate the effects of magnetized water on leaching soil. The rig consists of a magnetization device that can provide variable intensity. Water was supplied from a constant head reservoir to the magnetization device then to the soils that were placed in plastic columns. Five different magnetic intensi
... Show More
In this paper, the using of Non-Homogenous Poisson Processes, with one of the scientific and practical means in the Operations Research had been carried out, which is the Queuing Theory, as those operations are affected by time in their conduct by one function which has a cyclic behavior, called the (Sinusoidal Function). (Mt / M / S) The model was chosen, and it is Single Queue Length with multiple service Channels, and using the estimating scales (QLs, HOL, HOLr) was carried out in considering the delay occurring to the customer before his entrance to the service, with the comparison of the best of them in the cases of the overload.
Through the experiments
... Show MoreIn subterranean coal seam gas (CSG) reservoirs, massive amounts of small-sized coal fines are released during the production and development stages, especially during hydraulic fracturing stimulation. These coal fines inevitably cause mechanical pump failure and permeability damage due to aggregation and subsequent pore-throat blockage. This aggregation behavior is thus of key importance in CSG production and needs to be minimized. Consequently, such coal fines dispersions need to be stabilized, which can be achieved by the formulation of improved fracturing fluids. Here, we thus systematically investigated the effectiveness of two additives (ethanol, 0.5 wt % and SDBS, 0.001 and 0.01 wt %) on dispersion stability for a wide range of condit
... Show MoreKE Sharquie, SM Al-Tammimy, S Al-Mashhadani, RK Hayani, AA Al-Nuaimy, Dermatology online journal, 2006 - Cited by 34
Background: Successful root canal therapy depends on thorough chemo mechanical debridement of pulpal tissue, dentin debris and infective microorganisms. Objective: This study aimed to investigate the antibacterial effect of silver nanoparticles, sodium hypochlorite and chlorhexidine in reducing the bacterial infection of the root canals. Materials and Methods: The root canals of 55 single-rooted teeth were cleaned, shaped, and sterilized. All the teeth samples were inoculated with Enterococcus faecalis and incubated at 37°C for 2 weeks. Then, the teeth were divided into four groups. Group I (n=15): 100 ppm silver nanoparticles, Group II (n=15): 2.5 sodium hypochlorite, Group III (n=15): 2% chlorhexidine, IV (n=10): Normal saline as a contr
... Show More