In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreThe research shows that the visual image plays an important role when Farzdaq in the issue of aesthetic perception, it enables him to feel a sense of artistic and mental perception to raise astonishment and admiration through his ability to link the optics through the suggestive image to carry us to a new vision imagined full of visual images.
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreThe current study aimed to isolate and diagnose Candida spp yeasts that cause candidiasis with a PCR device from patients reviewed for some hospitals in Baghdad city and by 190 samples, the study recorded 123 isolates and the total percentage of infection was 64.7% .Samples were taken from different clinical cases of the vagina, blood and mouth and the Candida spp were (70.37%, 41.26%, 86.95%) respectively. Five types of yeasts were isolated and diagnosed, namely C. albicans, C. tropicalis, C. parapsilosis, C. krusei and C.glabarta. They were confirmed by PCR device and the most notable were yeast C. albicans, where 91 isolates were found, 73.98%, while the lowest infection was recorded. C.glabartawith 3 isolates, at 2.43%, significant diff
... Show MoreThe amount of protein in the serum depends on the balance between the rate of its synthesis, and that of its catabolism or loss. Abnormal metabolism may result from nutritional deficiency, enzyme deficiency, abnormal secretion of hormones, or the actions of drugs and toxins. Renal cancer is the third most common malignancy of the genitourinary system, and accounts for 3% of adult malignancies globally. Total serum proteins were measured in malignant kidney tumor, benign kidney tumors, and non tumoral kidney diseases patient groups, as well as in healthy individuals. A significant decrease (p< 0.001) of total serum protein levels in patients with malignant kidney tumors when compared with those of benign tumors, non tumoral diseases, and hea
... Show MoreModern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.
This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal
... Show MoreThe current research aims to investigate the effect of a specimen of Daniel in the acquisition of concepts for the Arabic language curricula material to the students of the third phase of the Faculty of Basic Education Department of Arabic Language. The sample consists of (93) applications and a student of (47) students in the Division (A), which represents the experimental group which studied the use of a specimen of Daniel, and (46) students in the Division (B), which represents the control group, which studied the traditional way. The subject of unified two groups, which subjects the Arabic language curricula which includes six chapters.
The duration of the experiment is a full semester. The researchers also prepared a tool for mea