The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.
In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Viruses have not previously been reported to act as chemotactic/chemoattractive agents. Rather, viruses as extracellular entities are generally viewed as non-metabolically active spore-like agents that await further infection events upon collision with appropriate host cells. That a virus might actively contribute to its fate via chemotaxis and change the behavior of an organism independent of infection is unprecedented.
Lignin has emerged as a promising asphalt binder modifier due to its sustainable and renewable nature, with the potential to improve flexible pavement performance. This study investigates the use of Soda Lignin Powder (SLP), derived from Pinus wood sawdust via alkaline treatment, as an asphalt modifier to enhance mixture durability. SLP was characterized using Fourier Transformation Infrared Spectroscopy (FTIR), X-ray Diffraction (XRD), and Scanning Electron Microscopy with Energy Dispersive X-ray Analysis (SEM/EDX), revealing significant changes in its chemical structure post-extraction. These analyses showed the presence of phenolic units, including hydroxyphenyl propane, syringyl, and guaiacyl units. The morphology of SLP was identified
... Show MoreThe sol-gel route using an agar gel with calcium nitrate and phosphate solution as starting materials for producing hydroxyapatite (HAP). The product formed were needle like, zigzag and straight fibres. The fibrous products on sintering transformed into stoichiometric HAP with a biological Ca/P ratio of 1.67. The influences of pH, temperature, nature of base and phosphate solution on the growth of fibrous HAP were studied. The pH of the solution was found to greatly influence the growth rate and morphology of the resultant product. The optimum gel temperature was found to be 60oC and sintering temperature of 900oC for 1 hour. The crystalline, thermal, functional and morphological characteristics of the fibrous HAP were investigated.
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe study hypothesize that the majority of Arab countries show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t
... Show More