Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods in terms of average segmental SNR, number of failing samples, and Czekanowski Distance (CZD). In addition, the proposed method shows the ability to operate with large message sizes (up to half of carrier size) with graceful degradation as opposed to the other methods which fail at large message size. So, the proposed method provides more flexibility in message and carrier sizes while preserving high efficiency.
The results of the study showed the statistical significant difference (P≥0.05) for each of the relative weight of the yolk and egg whites, the relative weight of the shell and the Hauh unit, which is affected positively by the addition of ground fenugreek seed and Laurels leave to the quail bird's diet. There is also a statistically significant difference positively for each of the percentage of ash, protein and carbohydrates for qualis egg, while there is no significant difference for both the percentage of moisture and fat. The results of the mineral estimation showed an increase in each of the elements of iron, copper and cadmium from the addition of fenugreek and laurels leave, while there was no significant difference for
... Show MoreAtorvastatin (ATR) is poorly soluble anti-hyperlipidemic drug; it belongs to the class II group according to the biopharmaceutical classification system (BCS) with low bioavailability due to its low solubility. Solid dispersions adsorbate is an effective technique for enhancing the solubility and dissolution of poorly soluble drugs.
The present study aims to enhance the solubility and dissolution rate of ATR using solid dispersion adsorption technique in comparison with ordinary solid dispersion. polyethylene glycol 4000 (PEG 4000), polyethylene glycol 6000 (PEG 6000), Poloxamer188 and Poloxam
... Show MoreAtorvastatin (ATR) is a poorly water-soluble anti-hyperlipidemic drug. The drug belongs to the class II group according to the biopharmaceutical classification system (BCS) with low bioavailability due to its low solubility. Solid dispersion is an effective technique for enhancing the solubility and dissolution of drugs. Phospholipid solid dispersion (PSD) using phosphatidylcholine (PC) as a carrier with or without adsorbent (magnesium aluminum silicate, silicon dioxide 15nm, silicon dioxide 30nm, calcium silicate) was used to prepare ATR PSD using different drug: PC: adsorbent ratios by solvent evaporation method. The resulted PSD was evaluated for its percentage yield, drug content, solubility, dissolution rate, Fourier transforma
... Show MoreThis study aims to investigate the effect of low concentrations of sulfuric antioxidants on sperm of rams. This study was conducted in the field of sheep and goats of the Department of Livestock in the collage of Agricultural Engineering Sciences, University of Baghdad. The semen was collected using the artificial vagina at weekly rate (Pooled semen) and was subjected to different tests and then was divided into seven treatments but different concentrations of cysteine (0.5, 1mM) and glutathione (0.5, 1mM) and taurine (0.5, 1mM).The sample of the semen was diluted with Tris dilution (10: 1). The results showed that the low concentrations of glutathione, cysteine and taurine resulted i
Tillage tools are subject to friction and low-stress abrasive wear processes with the potential deterioration of the desired soil quality, loss of mechanical weed efficacy, and downtime for replacing worn tools. Limited experimental methods exist to quantify investigate the effect of wear-resistant coatings on shape parameters of soil-engaging tools. ASTM standard sand/rubber wheel abrasion and pin-on-disk tests are not able to simulate wear characteristics of the complex shape of the tillage tools. Even though the tribology of tillage tools can be realistic from field tests, tillage wear tests under field conditions are expensive and often challenging to generate repeatable engineeri
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More