Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of confidential data. This paper presents a steganography method in frequency domain. Haar Wavelet Transform is applied for decomposition of gray level cover image into four sub-bands. The secret image is hidden in the high frequency HH sub-band after applying the histogram modification followed by scrambling process. A Histogram modification is adopted, to scale the secret image to normalize its values, that manipulates the secret image from bright image to dark. Thus the secret image becomes invisible so it can be hidden in the high frequency sub-band. Scrambling the positions can be for rows then columns, which will give strong security of the hiding process. The experimental results demonstrate the proposed method has achieved superior performance in terms of quantifiable measurement (PSNR and correlation) and in terms of visual quality. The proposed method propositions good imperceptible results and good response for against the various image attacks.
In this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art
... Show MoreImam Muslim bin Qasim al-Qurtubi And his efforts in wound and modification
In the present research synthesis and study of biological activity a series of new polymers modified of chitosan with compounds containing azo group. Beginning diazonium salt produced from 3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine reacted with concentrated HCl acid and sodium nitrite. The coupling reaction between diazonium salt with substituted aromatic aldehyde to produce Azo derivatives )1-6(. Azo Schiff bases Chitosan )7-12( were synthesized by condensation of Chitosan with Azo derivatives )1-6( in ethanol with some drops of glacial acetic acid. The structural modifications of Chitosan ring (linked to a bioactive azo moiety) were expected to give new derivatives )7-12( with a diverse range of biological functions. These compounds' st
... Show MoreThis investigation deals with the use of orange peel (OP) waste as adsorbent for removal of nitrate (NO3) from simulated wastewater. Orange peel prepared in two conditions dried at 60C° (OPD) and burning at 500 °C (OPB). The effect of pH: 2-10, contact time: 30- 180 min, sorbent weight: 0.5- 3.0 g were considered. The optimal pH value for NO3 adsorption was found to be 2.0 for both adsorbents. The equilibrium data were analyzed using Langmuir and Freundlich isotherm models. Freundlich model was found to fit the equilibrium data very well with high-correlation coefficient (R2). The adsorption kinetics was found to follow pseudo-second-order rate kinetic model, with a good correlation (R2
... Show Moreفي البحث الحالي تم تحضير ودراسة النشاط الحيوي لسلسلة من البوليمرات الجديدة المحورة من الكيتوسان مع مركبات تحتوي على مجموعة الآزو. في البداية تم تحضير ملح الديازونيوم من تفاعل 3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine مع حامض الهيدروكلوريك المركز ونتريت الصوديوم .ثم تفاعل الازدواج بين ملح الديازونيوم مع الديهايدات اروماتية معوضة لإنتاج مشتقات الازو (1-6). ازو شف بيس كيتوسان((12-7 والتي حضرت من تفاعل الكيتوسان مع مشتقات
... Show MoreAbstract
In this research we study the wavelet characteristics for the important time series known as Sunspot, on the aim of verifying the periodogram that other researchers had reached by the spectral transform, and noticing the variation in the period length on one side and the shifting on another.
A continuous wavelet analysis is done for this series and the periodogram in it is marked primarily. for more accuracy, the series is partitioned to its the approximate and the details components to five levels, filtering these components by using fixed threshold on one time and independent threshold on another, finding the noise series which represents the difference between
... Show More