In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT decomposition via SVD coefficients extracted from DCT-transformed images in the midfrequency band. A content-aware strategy combining Gaussian blurring, Canny edge detection, and zigzag scanning is employed to increase robustness against image processing attacks. The experimental results demonstrate the effectiveness of the proposed approach, which achieves up to a 10.4% improvement in PSNR, an SSIM score of 0.996, and a 0.10% increase in NCC over those of previous methods, which mostly rely on grayscale images. These results reflect the ability of the system to maintain high visual quality while offering strong resilience and security for embedded data in full-color images.
Urban morphological approach (concepts and practices) plays a significant role in forming our cities not only in terms of theoretical perspective but also in how to practice and experience the urban form structures over time. Urban morphology has been focused on studying the processes of formation and transformation of urban form based on its historical development. The main purpose of this study is to explore and describe the existing literature of this approach and thus aiming to summarize the most important studies that put into understanding the city form. In this regard, there were three schools of urban morphological studies, namely: the British, the Italian, and the French School. A reflective comparison between t
... Show MoreThe absurdity of Orientalist thought and its deviation in interpretation
Quranic text
View and critique
Abstract
This research deals with the technical of opening text during the critical
study about the poem of Al- ssiyab which is named ( city with out rain)
We chose this poem also to make connection with the western critical
theories.
Our study aims to explain the act of opening texts and critics and its
methods and directions in modern Arabic poetry.
It also aims to show the differences in the point of view between critics
and poetries.
The research depends on dimension vision of selective, and descriptive.
Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
Piracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.
The study aimed at knowing the financial consumer about the available protection from financial and banking services, presenting, and examining the evidence of some indicators indicating the reality of financial inclusion in the Iraqi banking system. Therefore, the study sought to know the extent of the level of protection available to the financial consumer as a result of its use of financial and banking services by the Iraqi banking system, and what It is the reality of financial inclusion in the banking system by measuring some financial and banking indicators. The study relies on the two (analytical) and (descriptive) approaches based on the questionnaire form and the data issued by the Central Bank of Iraq (2017-2020). Watch
... Show MoreTRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license
This work studies the performance of zeolite permeable reactive barrier in removing cadmium from a contaminated shallow aquifer. Batch tests have been performed to characterize the equilibrium sorption properties of the zeolite in cadmium-containing aqueous solutions. A 1D numerical finite difference model has been developed to describe pollutant transport within groundwater taking pollutant sorption on the permeable reactive barrier (PRB), which is performed by Langmuir equation, into account. Numerical results show that the PRB starts to saturate after a period of time (~120 h) due to reduction of the retardation factor, indicating a decrease in the percentage of zeolite functionality. However, a reasonable agreement between model predict
... Show MoreNowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s
... Show More