The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.
The woman represents an existential dualism with the man along history. This existence has been manifested through the history of Art starting from the arts of the old civilizations until modernism. It must be said that the history of Art refers to her presence as an extension for this history in the oriental arts, and the Arab countries including Iraq. The woman has varying outputs in terms of the content of her presence and the style of presentation. In her characterizations: maternity, fertility, femininity and others. The Iraqi artists adopted these fields among them the artist Jaber Alwan who formulated his style of presentation and its units depending on the feminine presence and his experience in her formal and stylistic fie
... Show MoreTV medium derives its formal shape from the technological development taking place in all scientific fields, which are creatively fused in the image of the television, which consists mainly of various visual levels and formations. But by the new decade of the second millennium, the television medium and mainly (drama) became looking for that paradigm shift in the aesthetic formal innovative fields and the advanced expressive performative fields that enable it to develop in treating what was impossible to visualize previously. In the meantime, presenting what is new and innovative in the field of unprecedented and even the familiar objective and intellectual treatments. Thus the TV medium has sought for work
... Show MoreBackground: Body image is one of the most important psychological factors that affects adolescents’ personality and behavior. Body image can be defined as the person’s perceptions, thoughts, and feelings about his or her body.
Objectives: to identify the prevalence of body image concerns among secondary school students and its relation to different factors.
Subjects and methods: A cross-sectional study conducted in which 796 secondary school students participated and body shape concerns was investigated using the body shape questionnaire (BSQ-34).
Results: The prevalence of moderate/marked concern was (21.6%). Moderate/ marked body shape concern was significantly associated
... Show MoreThe issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of
... Show MoreThe subject of marketing culture and mental image is one of the important topics in the field of management. There is no study that combines these two variables. The research is important because of the increasing importance of the subject. The future direction of the company in question will support the company's economic and marketing responsibilities. And reflect the company's mental image, as a culture that contributes to changing the reality of the organization investigated by polling the views of a sample of managers in the General Company for Vegetable Oil Industry, which (30) out of the (65) individual, and There are two hypotheses of research: There is a significant
... Show MoreThis study aimed to identify the perceived mental image of volunteering, and its relationship to volunteer motivation among a sample of Al-Quds Open University students, as well as to identify the differences in the perceived mental image of volunteering due to variables (gender, year of study, place of residence, college). The researcher has used relational descriptive approach. The researcher has used two questionnaires, the first was used to measure the perceptive mental image of volunteering, and the second to measure the motivation towards volunteering, and the study population may consist of all students of Al-Quds Open University Hebron Branch during the first semester of the academic year 2021/2020 and their number (3462)Male and
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show More