Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego images. The proposed algorithm is compared with wavelet based algorithm which shows a favorable results in terms of PSNR reaches to 18 dB.
Recently, increasing material prices coupled with more acute environmental awareness and the implementation of regulation has driven a strong movement toward the adoption of sustainable construction technology. In the pavement industry, using low temperature asphalt mixes and recycled concrete aggregate are viewed as effective engineering solutions to address the challenges posed by climate change and sustainable development. However, to date, no research has investigated these two factors simultaneously for pavement material. This paper reports on initial work which attempts to address this shortcoming. At first, a novel treatment method is used to improve the quality of recycled concrete coarse aggregates. Thereafter, the treated recycled
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreDiabetes mellitus, with adverse neonatal events are challenging issues to all obstetricians and pediatricians, where uric acid could play a vital role. We aimed to assess the relationship and prognostic benefits of serum uric acid measured at about 20 weeks’ gestation in normotensive pregnancy, with subsequent maternal diabetes, and neonatal complications. All singleton normotensive pregnant women with normal blood glucose, serum creatinine, and weight before pregnancy, whom attended Medical City Hospital, Department of Obstetrics and Gynecology in Baghdad, were involved and regarded as the case group, on the condition that their serum uric acid measured at 20 weeks’ gestation > 3 mg/dl, but if ≤ 3 mg/dl, they would be regi
... Show MoreThis study focuses on a comparison of the performance of two similar locally-fabricated solar water heaters. One of the collectors features a new design for accelerated absorber; its risers are made of converging ducts whose exit area is half that of the entrance. The other collector is a conventional absorber, with risers of the same cross sectional area along its length. Each collector is the primary part of an indirect thermosyphon circulation solar hot water system. Both collectors face south with a fixed tilt angle of 33.3
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreEffects of Ozonated Water on Micro Leakage between Enamel and Fissure Sealants Prepared by Different Etching Technique (An in vitro Study), Baraa M Jabar*, Muna S Khalaf
In this work, (CdO)1-x (CoO)x thin films were prepared on glass slides by laser-induced plasma using Nd:YAG laser with (λ=1064 nm) and duration (9 ns) at different laser energies (200-500 mJ) with ratio (x=0.5), The influence of laser energy on structural and optical properties has been studied. XRD patterns show the films have a structure of polycrystalline wurtzite. As for AFM tests results for the topography of the surface of the film, where the results showed that the grain size and the average roughness increase with increasing laser energy. The optical properties of all films were also studied and the results showed that the absorption coefficient for within the wavelength range (280-1100 nm), The value of the optical power gap fo
... Show More