An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreMolasse medium containing different concentrations of (NH4)2 SO4, (NH4)3 PO4, urea, KCI, and P2O5 were compared with the medium used for commercial production of C. utilis in a factory south of Iraq. An efficient medium, which produced 19. 16% dry wt. and 5. 78% protein, was developed. The effect of adding various concentrations of micronutrients (FeSO4, 7T20, MnSO4. 7H20, ZnSO4. 7E20) was also studied. Results showed that FeSo4. 7H20 caused a noticeable increase in both dry wt. and protein content of the yeast.
Soils located above the groundwater table are generally unsaturated and possess negative pore-water pressures. A soil-water characteristic curve (SWCC) that relates the water content of a soil to matric suction is an important relationship for the unsaturated soil mechanics. The SWCC essentially shows the ability of an unsaturated soil to retain water under various matric suctions. The filter paper method is a soil suction measurement technique. Soil suction is one of the most important parameters describing the moisture condition of unsaturated soils. The measurement of soil suction is crucial for applying the theories of the engineering behavior of unsaturated soils.In this paper, three soil samples were collected from three sites within
... Show MoreThe research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the
... Show More