Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.
The study of the " Speech act " in grammatical codes reveals great efforts in the study of the elements of linguistic communication contained in their efforts, and is part of the study of the linguistics of heritage, and the research has been designed to identify the verbal act in the blog of Ibn al-Khabaz (guiding the shine) by studying its sections comprehensively; To the spirit of grammatical discourse as well as the combination of the concept of the semantic act already verbal according to Searle, and its response in the form of indirect verbal acts more than direct acts, as well as the pure formulas of the opinions of the violators in the speech of Ibn al-Khabaz other than the proven verbal formulas Approval and approval, the class
... Show Moreالمقدمة
تتعامل الجهات الضريبية في مختلف دول العالم بأساليب عديدة لجباية الضرائب من المكلفين بغض النظر عن فئات وأصناف هؤلاء المكلفين،وفي العراق تم اعتماد العديد من الأساليب لجباية الضرائب على امتداد المدد الزمنية المتعاقبة،وكان لأسلوب التقدير الذاتي وهو أحد تلك الأساليب مجالاً للتطبيق خلال مدة زمنية معينة،حيث جرى تطبيق هذا الأسلوب على وحدات اقتصادية معينة، وبالرغم من المساوئ التي قد ترافق تطبيق
... Show MoreABSTRACT
Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-
... Show MoreIt included the introduction to the research and its importance, as the knee joint is one of the important joints in the human body that are susceptible to injury, and among these injuries is the roughness of the knee that occurs as a result of weakness and imbalance in the work of the quadriceps muscle, so its treatment is through rehabilitation exercises to treat weakness and gain flexibility and strength.Hence the importance of the research by developing rehabilitation exercises with different resistances in the water medium and restoring flexibility and muscular strength for patients with knee roughness for ages from 30-40 years, and the experimental method was used to solve the research problem, and the research sample included (6) of
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThe goal of current research is marked "student services for the university student at the Faculty of Education for Girls at Baghdad University in light of the overall quality indicators)" to identify the relative importance of the availability of student services offered by the College of Education at the University of Baghdad, from the viewpoint of the students. The research was Aaguetdy followers researcher Find descriptive approach to suitability research topic and in order to achieve the purposes of research, the researcher designed questionnaire examined consisted of (18) items and has been questionnaire on arbitrators and experts to verify the validity and reliability that's been applied to the questionnaire on a group of students
... Show MoreAbstractBACKGROUND: Some cases of vitiligo require melanocyte transplantation, but these surgical techniques have varying degrees of success. OBJECTIVES: To perform melanocytes transplantion in patients with vitiligo using a new needling micrografting technique. PATIENTS and METHODS: This interventional case study took place at the Department of Dermatology and Venereology at Baghdad Teaching Hospital from December 2010 to September 2011. Twelve patients with vitiligo were included. A split-thickness skin graft was taken from the normal area and cut into micropieces ranging from 0.1 mm to 0.3 mm in diameter. The recipient area was anesthetized, and the micrografts were then implanted into the dermis using the needling technique. The number
... Show MoreCrises affect the economic growth of the country in general and the banking sector in particular. Given the importance of this sector, it is necessary to evaluate the performance of banks from time to time and monitor the liquidity of each bank and how to organize its management to overcome any crisis or emergency situation that may befall it. The research seeks to diagnose the level of impact of crisis management. In the liquidity of Iraqi private banks, using liquidity indicators, as the research community represents the banks listed in the Iraq Stock Exchange As for the research sample, it is represented by (10) pri
... Show MoreThe aim of the study was to know the factors analysis of scale Bar-On & Parker, post analysis is found fourteen factors for the first degree of the scale. Also we extracted five factors from the second degree.
The scale consists of (60) items , applied on sample of (200) students (Male &Female ) age (15-18) years randomly chosen from preparatory schools . The scale unveiled satis factors validity and reliability. An others aims is to low the emotional Intelligence level and know the difference of statistical in sex , age variable and the specialization variable .The result was no difference of statistical in sex and specialization variable , but the difference appear
... Show More