In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
ten albino male rates were orally treated daily 20% and 30% ethanol for 30 days treatment with 30%ethanol caused of hippocampuse of darckness google hospital patients
Milling Machining is a widely accepted nontraditional machining technique used to produce parts with complex shapes and configurations. The material is removed in two stages roughing and finishing, the flat end cutter removed the unwanted part of material, then finished by end mill cutter. In milling technique, the role of machining factors such as cutting depth, spindle speed and feed has been studied using Taguchi technique to find its effectiveness on surface roughness. Practical procedure is done by Taguchi Standard matrix. CNC milling is the most conventional process which is used for removing of material from workpiece to perform the needed shapes. The results and relations indicate that the rate of feed is v
... Show MoreThis paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and
... Show Moreالخلاصة Bahraini Parliamentary Elections and their Impact on the Popular Uprising) Bahrain has a distinguished constitutional and parliamentary experience, which distinct it from the other Gulf Cooperation Council (GCC) countries. Its experience in this area is the second after the experience of Kuwait to establish a system of government based on modern constitutional principles. As the government presented the Constitution to the Constituent Assembly elected by people and approved in 09/06/1973. After that, it witnessed the birth of the first parliament elected by the people in 1973, but the experiment did not last long and the parliament dissolved by Prince, and didn’t determine the period of the return of the working with the
... Show MoreNS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.