In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT decomposition via SVD coefficients extracted from DCT-transformed images in the midfrequency band. A content-aware strategy combining Gaussian blurring, Canny edge detection, and zigzag scanning is employed to increase robustness against image processing attacks. The experimental results demonstrate the effectiveness of the proposed approach, which achieves up to a 10.4% improvement in PSNR, an SSIM score of 0.996, and a 0.10% increase in NCC over those of previous methods, which mostly rely on grayscale images. These results reflect the ability of the system to maintain high visual quality while offering strong resilience and security for embedded data in full-color images.
Segmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and ge
... Show MoreA simplified theoretical comparison of the hydrogen chloride (HCl) and hydrogen fluoride (HF) chemical lasers is presented by using computer program. The program is able to predict quantitative variations of the laser characteristics as a function of rotational and vibrational quantum number. Lasing is assumed to occur in a Fabry-Perot cavity on vibration-rotation transitions between two vibrational levels of hypothetical diatomic molecule. This study include a comprehensive parametric analysis that indicates that the large rotational constant of HF laser in comparison with HCl laser makes it relatively easy to satisfy the partial inversion criterion. The results of this computer program proved their credibility when compared with th
... Show MoreA simple, accurate and sensitive spectrophotometric method for the determination of Procaine penicillin (PP) is described. The method is based on charge-transfer reaction of PP with metol (N-methyl-p-hydroxy aniline) in the presence of ferric sulphate to form a purple-water soluble complex ,which is stable and has a maximum absorption at 510 nm .A graph of absorbance versus concentration shows that Beer’s low is obeyed over the concentration range of 3-80 µg /ml of PP (i.e.,3-80 ppm) with a molar absorbativity of 4.945 ×103 L.mol-1.cm-1 ,Sandell sensitivity of 0.1190 µg cm-2 ,a relative error of (-1.57)-2.79 % and a standard deviation of less than 0.59 depending on the concentration of PP.The optimum conditions for full co
... Show MoreCoblatcomplex has been prepared by reaction between C16H19N3O3S (L) as ligand and metal salt (II). The prepared complex were characterized by infrared spectra, electromic spectra, magnetic susceptibility, molar conductivity measurement and metal analysis by atomic absorption and (C.H.N) analysis. From these studies tetrahedral geometry structure for the complex was suggested. The photodegredation of complex were study using photoreaction cell and preparednanoTiO2 catalyst in different conditions (concentration, temperatures, pH).The results show that the recation is of a first order with activation energy equal to (6.6512 kJ /mol).
Cladophora and Spirulina algae biomass have been used for the removal of Tetracycline (TC) antibiotic from aqueous solution. Different operation conditions were varied in batch process, such as initial antibiotic concentration, different biomass dosage and type, contact time, agitation speed, and initial pH. The result showed that the maximum removal efficiencies by using 1.25 g/100 ml Cladophora and 0.5 g/100 ml Spirulina algae biomass were 95% and 94% respectively. At the optimum experimental condition of temperature 25°C, initial TC concentration 50 mg/l, contact time 2.5hr, agitation speed 200 rpm and pH 6.5. The characterization of Cladophora and Spirulina biomass by Fourier transform infrared (FTIR) indicates that the presenc
... Show MoreThis work focused on principle of higher order mode excitation using in- line Double Clad Multi-Mode Mach-Zehnder Interferometer (DC-MM-MZI). The DC-MM-MZI was designed with 50 cm etched MMF. The etching length is 5cm. The tenability of this interferometer was studied using opt grating ver.4.2.2 and optiwave
ver. 7 simulator. After removing (25, 35, 45, 55) μm from MMF and immersing this segment of MMF with water bath contained distilled water and ethanol, in addition to, air. Pulsed laser source centered at 1546.7nm ,pulse width 10ns and peak power 1.33mW was propagated via this interferometer Maximum modes were obtained in case of air surrounded media which are 9800 and 25 um removed cladding layer, with peak power 49.800 m
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreA strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as
... Show MoreConstruction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.