The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.
In this research paper, a new blind and robust fingerprint image watermarking scheme based on a combination of dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains is demonstrated. The major concern is to afford a solution in reducing the consequence of geometric attacks. It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. The initial sub-vectors were obtained by sub-sampling in the host fingerprint image of both real and imaginary parts of the DTCWT wavelet coeffi
... Show MoreIn this paper a method to determine whether an image is forged (spliced) or not is presented. The proposed method is based on a classification model to determine the authenticity of a tested image. Image splicing causes many sharp edges (high frequencies) and discontinuities to appear in the spliced image. Capturing these high frequencies in the wavelet domain rather than in the spatial domain is investigated in this paper. Correlation between high-frequency sub-bands coefficients of Discrete Wavelet Transform (DWT) is also described using co-occurrence matrix. This matrix was an input feature vector to a classifier. The best accuracy of 92.79% and 94.56% on Casia v1.0 and Casia v2.0 datasets respectively was achieved. This pe
... Show MoreImage segmentation is a basic image processing technique that is primarily used for finding segments that form the entire image. These segments can be then utilized in discriminative feature extraction, image retrieval, and pattern recognition. Clustering and region growing techniques are the commonly used image segmentation methods. K-Means is a heavily used clustering technique due to its simplicity and low computational cost. However, K-Means results depend on the initial centres’ values which are selected randomly, which leads to inconsistency in the image segmentation results. In addition, the quality of the isolated regions depends on the homogeneity of the resulted segments. In this paper, an improved K-Means
... Show MoreSocial networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques
... Show MoreThe research was titled: Approval of the Imam of the Nuclear of Iraqis through the curriculum of the students.
The research revolves around the study of the weight of the imam nuclear jurisprudence in which the views of the Iraqi jurists of the Imam Shafi'i agreed through the book of students' approach to the nuclear imam, the research included a brief translation of the nuclear imam, and the definition of his place in the Shafi'i school, and then the definition of Iraqi jurists and then study the jurisprudence The course of research is only three issues, and compared with the views of imams, and the statement of the most correct opinion, and God and the conciliator.
researcher
The mass attenuation coefficient for beta particles through pure Polyvinyl chloride (PVC) and flax fibers- reinforced PVC composite were investigated as a function of the absorber thickness and the absorber to source distance. The beta particles mass attenuation coefficients were obtained using a NaI(Tl) energy selective scintillation counter with 90Sr/ 90Y beta source having an energy range from (0.546-2.275) MeV. Pure PVC polymer samples were prepared by compacting the PVC powder in a mould at high pressure (10bar) and temperature about 140°C for 30 minutes. A hot press system was used for this process. The experimentally obtained values of mass attenuation coefficients for 90Sr and 90Y were found to be 7.72 cm2.g-1and 0.842 cm2.g-1 r
... Show MoreThe aim of this scientific paper is to highlight the effective role of women working in economic development, especially those working in the entrepreneurial sector, which we see as encouraging at the macro-economic level and at the personal level, by highlighting their potential to help them enter the private labour market, value them and empower their role in the economic arena in order to win this bet to become productive and effective workers at all levels.
Through this paper, we will try to highlight the role of Algerian women's contribution to economic development through access to the world of entrepreneurship, and we will also try to find statistics on their success levels at the local and interna
... Show MoreComplement activation leads to membrane attack complex formation, which can lyse not only pathogens but also host cells. Histones can be released from the lysed or damaged cells and serve as a major type of damage-associated molecular pattern, but their effects on the complement system are not clear. In this study, we pulled down two major proteins from human serum using histone-conjugated beads: one was C-reactive protein and the other was C4, as identified by mass spectrometry. In surface plasmon resonance analysis, histone H3 and H4 showed stronger binding to C4 than other histones, with KD around 1 nM. The interaction did not affect C4 cleavage to C4a and C4b. Because histones bin