Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.
The pre - equilibrium and equilibrium double differential cross
sections are calculated at different energies using Kalbach Systematic
approach in terms of Exciton model with Feshbach, Kerman and
Koonin (FKK) statistical theory. The angular distribution of nucleons
and light nuclei on 27Al target nuclei, at emission energy in the center
of mass system, are considered, using the Multistep Compound
(MSC) and Multistep Direct (MSD) reactions. The two-component
exciton model with different corrections have been implemented in
calculating the particle-hole state density towards calculating the
transition rates of the possible reactions and follow up the calculation
the differential cross-sections, that include MS
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreTime is an essential element of contracts، as there is an independent in many parts of each contract، but the time dimension has a significant impact on the provisions of all contracts and is not limited to a particular range of contracts، and French and Arab jurists alike have called for this dimension to be given special attention، and as a result the French legislator has introduced the term duration of the contract، to try to limit the temporal elements، to clarify their provisions and to distinguish between them in decree131/2 016، but for our Arab country it did not receive the appropriate answer. The problem of duration in contracts relates to the lack of clarity of the idea، and then to confuse the various time terms in the
... Show MoreThe importance of research and study of classical Persian literature is not overlooked. So far, there have been many studies in this area. But there are still some things that need more research. Persian grammar is one of the most important branches of Persian literature. This section has always been converted at different times. One of the issues that has been neglected in the studies of classical literature is the study of the technical tales of past and past poetry. These texts can be studied from different perspectives. Because Persian is a mixed language, it is possible to combine language terms with each other or to add prefixes and suffixes to express new concepts. They can be used by exam
... Show MoreAbstract: This study aims to investigate the effects of solvents of various polarities on the electronic absorption and fluorescence spectra of RhB and Rh6G. The singlet‐state excited dipole moments (me) and ground state dipole moments (mg) were estimated from the equations of Bakshiev -Kawski and Chamma‐ Viallet using the variation of Stokes shift along with the solvent’s dielectric constant (e) and refractive indexes (n). The observed singlet‐state excited dipole moments were found to be larger than the ground‐state ones. Moreover, the obtained fluorescence quantum yield values were influenced by the environment of the fluorescing molecule. Consequently, the concentration of the dye solution, excited singlet state absorption and
... Show MoreThe research aims to identify the level of awareness of student teachers in the behavioral disorders and autism specialization about the diagnosing Autism Spectrum Disorder and Social (Pragmatic) Communication Disorder according to some variables. The study was conducted on a sample of (113) student teachers. The researcher employed the awareness scale of a teacher-screening questionnaire for autism spectrum disorder and social pragmatic communication disorder. The results showed that the average of teachers in the total degree of awareness of autism spectrum disorder and social communication have recorded a moderate degree. As for the awareness of autism spectrum disorder was high. Then, the awareness of social communication disorder wa
... Show Moreתקציר
ביטויי אהבה ושנאה קבלה בההגדרות שונות, לפעמים ביניהם לבין עצמם והסכימו בזמנים אחרים מהבחינה הדתית נתפסה לאהוב ביטויים ושנאה במונחים של טוב ורע, או במונחים של חלאל וחראם למעשה, הרגשות של אהבה ושנאה הם רגשות אנושיים המקושרים לאמונות של חברות אנושיות הבנויות על העמדה של דתות מכל נושא או מקרה , דבר אשר אהוב על ידי הקדושים והכמורה יהיה חלאל, וכל מה שהם שונאים יהיה חראם במילים אח
... Show MoreThe study aimed to reveal the degree of inclusion of media concepts in the books of social and national studies in general education in light of the criteria of media education and the nature of the Saudi society. Additionally, to identify the estimations of the participants in the study of the importance of including media concepts in these books, and to build a matrix of the range and sequence of media concepts in the books of social and national studies in the grades of Saudi general education. The study followed the descriptive approach in both descriptive analysis of the textbooks and descriptive survey of the study participants who were (203) students in the schools of boys and girls in general education in Makkah. The study used t
... Show MoreNumerous integral and local electron density’s topological parameters of significant metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp* Ir) (Cp Ru)2 (μ3-H) (μ-H)3]1 (Cp = η5 -C5Me5), (Cp* = η5 -C5Me4Et) were calculated and interpreted by using the quantum theory of atoms in molecules (QTAIM). The properties of bond critical points such as the delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density
... Show MoreThis paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show More