Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.
This research included the hadiths in which the urge to fast the month of the month, or the beginning of the month, and followed the inductive approach to collecting hadiths, and the critical approach in their studies, and in the weighting of the right from the faces contained in it, and one of the most important results of the research is the agreement of the words of the people On the whiteness, whether it is a little or a lot, the rush of the month will be the first three nights, where the moon white is a little, and they also agreed that the middle three are called the white days, and that the release of the rage on them for the whiteness of its nights, where the moon is complete, and the Prophet has been proven. May God bless him an
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Abstract
In this research, a study of the behavior and correlation between sunspot number (SSN) and solar flux (F10.7) have been suggested. The annual time of the years (2008-2017) of solar cycle 24 has been adopted to make the investigation in order to get the mutual correlation between (SSN) and (F10.7). The test results of the annual correlation between SSN & F10.7 is simple and can be represented by a linear regression equation. The results of the conducted study showed that there was a good fit between SSN and F10.7 values that have been generated using the suggested mutual correlation equation and the observed data.
The accuracy of the skillful performance of the front and back dimensions of badminton in volleyball, occurs through the investment of complex exercises (physical skills) in a single performance and its characteristics that give the correct movement behavior and speed to the accuracy of the performance of the strokes as well as the identification of changes in some physiological indicators of By using these compound exercises. The research problem lies: I found a weakness in the accuracy of the performance of the front and back dimensions strike and diagnosed this through the tests that it conducted on the players to identify and know the problem, and attributed this weakness to a weakness in the necessary physical and skill abilities and t
... Show MoreThin films of the blended solution of NiPc/C60 are fabricated using spin-coating method for three different ratios (100/1, 100/10 and 100/100) according to the weight. The films are deposited on to glass substrates and treated with several annealing temperatures (373, 423 and 473)K. The structure and surface morphology of the as-deposited and annealed films using x-ray diffraction and AFM was studied and exhibited a change and enhanced crystallization and surface morphology caused by changes in heat treatment temperatures. Investigation of X-ray diffraction patterns of NiPc/C60 indicated that it have polymorphism structure, i.e. mix between amorphous and polycrystalline structure. when heat treatment temperatures ch
... Show MoreAbstract
The current research aims to identify the typical effect of Flower and Coscroft on expressive performance and the development of lateral thinking among literary fifth-grade students. To achieve the research objective, the researcher chose a sample of (90) female students from the fifth literary grade, with two experimental groups and a control group. The research groups are of six subjects. The research found that the two experimental groups have more expressive performance than the control group. Students of the first experimental group outperformed the students of the second experimental group in expressive performance and lateral thinking tests. In light of the findings of the research, the researcher
... Show More