Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.
Background: study the effect of various risk factors on reperfusion success after thrombolysis by measuring ST resolution.
Objectives: Early patency of the infarct-related artery is associated with reduced mortality. Thrombolytic therapy is frequently followed by rapid recanalization lead to reduction of infarct size, improve left ventricular function and increase survival by reopening of coronary artery . The reduction in ST-segment elevation on the standard 12 lead electrocardiogram 1-4 h after initiation of thrombolysis may be the simplest and most useful clinical tool to test the effectiveness of thrombolytic therapy.
Methods: Seventy patients with acute ST elevation myocardial infarction admitted to alkindy teaching hospital C
In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels
... Show MoreThis research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreAfter completion of the artistic production, the artist plays the echo of this production upon the recipient. Whether this recipient is from the public, art connoisseurs, or private artists, critics and academics. In the past, the boundaries of Time and place had a great effect in limiting this echo or its quality, as the views of the recipients were largely influenced by the prevailing thought or the artistic trends that dominate the artistic scene in the surrounding environment in which the artist created. In order for the artist to show works for the widest segment of the recipient, he bears the burden of the costs of transporting the work, a keeper of damage on the move, and the material amounts that may hinder the publication of the
... Show MoreIn spite of the contemporary development over the world in pertaining of modernization and its differences about the transformation of the knowledge but, the important instrument to transfer the thoughts and information did not have change except the language. So the evolutionary process became as a torrent or fusillade above the cliff which drifted anything. So that the objective inquiry and impressed with varieties of development the casement to evaluate the linguistic or re - correction highlight article in order to preserve on the origins of the language and its sobriety.
Today, we have different correspondence and social media as
The research addresses the role of the digital economy in the growth of the Iraqi economy during the period from 2010 to 2022. The research is based on the hypothesis that the digital economy has become one of the primary growth drivers worldwide and has a close relationship with economic development. Therefore, the digital transformation in Iraq can accelerate bridging developmental gaps with other countries.
It has become evident that the Iraqi economy suffers from structural imbalances for various reasons, hindering economic growth. These reasons include political and economic factors, as well as the absence of a well-thought-out policy to promote the agricultural sector, which is considered one of the fundamental sectors capa
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreWA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
The research aims to diagnose the causes of the phenomenon of Marketing deception catalog, which is now deployed in the Iraqi market and related to producers and marketers, consumers, regulators and other institutions) and their impact in the areas of prejudice to the consumer protection (product and signifying specifications, price, advertising, packaging), as well as identify differences in the sample responses according to personal variables, it has been the adoption of the resolution as a tool to collect data and information through a sample survey of consumer opinions totaling 108 people in shopping centers in the province of Baghdad and in the Karkh and Rusafa, It was the use of methods selected statistical represented by the arith
... Show More