Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.
The main aim of this paper is to explain the effect of the aggregation accounting information on the financial, investment, and operational, managerial decision-making and the evaluation of the financial statements after aggregate. The problem of this study is represented in administrative decision-making that takes place under differentiated accounting systems operating within a governmental economic unit that seeks at the same time to achieve a unified vision and goals for the organization. This study was conducted at the College of Administration and Economics /University of Baghdad, and it represents a sample from a community of governmental economic units that apply differentiated accounting systems. The study method is repr
... Show MoreResearch Summary
Praise be to God, and may blessings and peace be upon the Messenger of God. As for:
The Noble Qur’an is the constitution of life, and a comprehensive educational approach that deals with individuals comprehensively, as it organizes worldly and eschatological life, and it is a curriculum concerned with organizing life starting with individuals and the family until the establishment of states, and from its comprehensiveness is reform, guidance and establishing boundaries. They have a disease in their hearts. They are exposed to this and are trying, by falsehood, to subjugate the Islamic world with man-made laws set by the West. Their aim is to distance people from
... Show MoreSemi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.
We compare two methods Bayesian and . Then the results were compared using MSe criteria.
A simulation had been used to study the empirical behavior for the Logistic model , with different sample sizes and variances. The results using represent that the Bayesian method is better than the at small samples sizes.
... Show MoreThis research aimed to definite Blending learning (BL) technique, and to know the impact of its use onacademic achievement in Biology course of second class students in secondary special schools in Omdurman Locality and attitudes towards it, to achieve this; researcher adopted the experimental method. The sample was selected of (41) students, chosen from Atabiyah school, were divided into two equals groups: one experimental group reached (26) students studied by using the BL technique, and the second control group (25) students have been taught in the traditional method.
Data has collected by using two tools: achievement test and a questionnaire for measuring the attitudes towards Blend
... Show MoreThe objective of this article is to delve into the intricate dynamics of marriage relationships, exploring the impact of emotions such as fear, love, financial considerations and likability. In our investigation, we adopt a perspective that acknowledges the nonlinear nature of interactions among individuals. Diverging from certain prior studies, we propose that the fear element within the context of marriage is not a singular, isolated factor but rather a manifestation resulting from the amalgamation of numerous social issues. This, in turn, contributes to the emergence of strained and unsuccessful relationships. Unlike conventional approaches, we extensively examine the conditions essential for the existence of all socially signifi
... Show Moreيشهد المسرح الدولي قضايا مستجدة ومستحدثة مثل تعدد الفاعلين من الدول ومن غير الدول وتزايد مساحات نفوذهم وتأثيرهم ،ومن جانب اخر أثرت جائحة كورونا على البيئة والمناخ بشكل ملموس على جوانب عدة. فضلا عن ذلك تأثرت جميع المجتمعات البشرية بالإرهاب والهجمات الالكترونية وغيرها ومن بينها دول والمجتمع الدولي بإفراده مؤسسات وكيان اقتصادي وسياسي وقانوني وأمني وامتداد اثاره واسبابه الكثيرة والمتداخلة وما يثيره من خلق حا
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More