Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Form recurrence of financial crises phenomenon disturbing and attention , and returns the reasons so that its negative effects were sharp and dangerous , because of the nature and cause of Ncaha , threatened political and economic stability of the countries in which they occur these crises , in addition to Machmlh these crises spread of contagion across multiple channels to include other countries many developed and developing , and the reason for this to the openness of the economic and financial witnessed by the countries affected by crises and other countries concerned, the financial crisis is a case of financial turmoil appears in one of the sections of the financial system one and extends to
... Show MoreThe public budget is regarded a main tool for economic and social development. The preparation of the public budget constitute an important stream which enriches the developmental efforts and the definition of its priorities, therefore it is the focus point of many specializations. The public budget has numerous functions. It is a means to precise and to execute the political and economic goals of the executive authority, a mirror of the economic structure which reflects its strength and weakness points, specifies its revenues and others. Since the parliament is the voice of the society which expresses its interests, then, it must monitor the performance of the government so that the participation of the legislative authority in
... Show MoreDBN Rashid, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
The right to property is one of the most fundamental rights enjoyed by individuals, and most national constitutions and laws, as well as international conventions, have to be respected and protected only in accordance with the economic and social development of the country (the so-called public benefit) and in return for just compensation. What is fair compensation?
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreAttitude is an important subject that has attracted researchers and thinkers in organizational theory and organizational behavior because of its great importance in various field studies. Field evidence suggests that individuals in their daily lives or careers respond to specific events through a set of internal tendencies Internal tendencies are negative or positive and systematic. These trends tend to be invisible, not limited to certain boundaries, and involve a significant number of individuals within organizations or society.
The research aims to identify the impact of trends in the ethics of public service workers for individuals, through a sample of (72) doctors and (60) administrative staff
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreThe area around the Suez Canal has been chosen particularly Sinai to implement the new Suez Canal project parallel to the original 72-km-long channel due to the importance of the commercial site of the Arab Republic of Egypt, competing with shipping lanes, to accommodate the increasing maritime traffic passing through the Suez canal, and to provide special services for trade world and reduce the economic cost of marine trip. The establishment of six tunnels for automobile and railway transport to Sinai The cost of the establishment of this new channel and the establishment of the tunnels about (2.8) billion, of which 4 billion cost of the new channel. Project implementation period is one year. The new proj
... Show MoreCurrently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show More