Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
We explore the transform coefficients of fractal and exploit new method to improve the compression capabilities of these schemes. In most of the standard encoder/ decoder systems the quantization/ de-quantization managed as a separate step, here we introduce new way (method) to work (managed) simultaneously. Additional compression is achieved by this method with high image quality as you will see later.
Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreThe international financial accounting and reporting standards IFRS/IAS represent the set of rules and foundations that the economic entity must follow in the measurement, presentation, and disclosure of the elements of the financial statements, the implementation of adopting the international financial reporting standards contributes to improving the qualitative characteristics of accounting information, so the current research aims to explain the role of adopting the International Accounting Standard (IAS) in improving the qualitative characteristics as well as analyzing the impact of the adoption of IAS.1 in improving the qualitative characteristics of accounting information within the financi
... Show MoreThis paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.
Excessive intake of fluoride, mainly through drinking water is a serious health hazard affecting humans worldwide. In this study, the defluoridation capacities of locally available raw waste beef bones have been estimated. Several experimental parameters including contact time, pH, bone dose, fluoride initial concentration, bone grains size, agitation rate, and the effect of co-existence of anions in actual samples of wastewater were studied for fluoride removal from aqueous solutions. Results indicated excellent fluoride removal effeciency up to 99.7% at fluoride initial concentration of 10 mg F/L and 120 min contact time. Maximum fluoride uptake was obtained at neutral pH range 6-7. Fluoride removal kinetic was well described by the ps
... Show MoreWater pollution as a result of contamination with dye-contaminating effluents is a severe issue for water reservoirs, which instigated the study of biodegradation of Reactive Red 195 and Reactive Blue dyes by E. coli and Bacillus sp. The effects of occupation time, solution pH, initial dyes concentrations, biomass loading, and temperature were investigated via batch-system experiments by using the Design of Experiment (DOE) for 2 levels and 5 factors response surface methodology (RSM). The operational conditions used for these factors were optimized using quadratic techniques by reducing the number of experiments. The results revealed that the two types of bacteria had a powerful effect on biodegradable dyes. The regression analysis reveale
... Show More
This research aims to study the impact of strategic information systems on the development of intellectual capital in the Public Shareholding Electricity Distribution Company in the Hashemite Kingdom of Jordan. To achieve the objectives of the study, a questionnaire was developed for the purpose of data collection, as the number of valid questionnaires for analysis was about (135), and SPSS and AMOS 0.26 software was used to analyze the collected data. The study found out that the respondents' perceptions of the level of importance of strategic information systems and the level of importance of intellectual capital were high, and that the relational capital has ranked as first, followed by structural capital, and h
... Show More