In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the Lyapunov exponents, fractal dimension, and bifurcation diagrams. Furthermore, an algorithm is suggested to generate a random binary key, serving as the controller for the embedding process. And the randomness of the generated key was checked. Moreover, this paper introduces a technique that utilizes the generated random key to govern both the embedding process in the spatial domain and the frequency domain. The results of this study are promising and its potential applications can be extended to various fields that require discreet communication and robust data protection
Many waste materials can be repurposed effectively within asphalt concrete to enhance the performance and sustainability of pavement. One of these waste materials is sawdust ash (SDA). This study explores the beneficial use of SDA as a substitute for limestone dust (LD) mineral filler in asphalt concrete. The replacement rate was 0%, 15%, 30%, 45%, and 60% by weight of total mineral filler. Scanning electron microscopy (SEM) was employed to assess the surface morphology of Sawdust (SD), SDA, and LD. In addition, a series of tests, including Marshall stability and flow, indirect tensile strength,moisture susceptibility, and repeated uniaxial loading tests, were conducted to examine the performance characteristics of asphalt mixtures of diffe
... Show MoreBackground: Cystinosis is a rare autosomal recessive lysosomal storage disease with high morbidity and mortality. It is caused by mutations in the CTNS gene that encodes the cystine transporter, cystinosin, which leads to lysosomal cystine accumulation. It is the major cause of inherited Fanconi syndrome, and should be suspected in young children with failure to thrive and signs of renal proximal tubular damage. The diagnosis can be missed in infants, because not all signs of renal Fanconi syndrome are present during the first months of life. Elevated white blood cell cystine content is the cornerstone of the diagnosis. Since chitotriosidase (CHIT1 or chitinase-1) is mainly produced by activated macrophages both in normal and inflammator
... Show MoreThe design studies, especially in their contemporary stages, have not been isolated from the subjects that underpin advanced ideas in the field of technical treatments that enrich and improve the social life of users through those technological innovations that have enhanced and changed life styles, Especially in the field of general institutional techniques, including cinemas, as the ideal places for people and visitors to this space, which can contribute to the promotion of cultural, social and technical aspects within this millennium. DONC as reflected on the positive communication and communication between the intellectual and cognitive develop individuals, including cultural and technical side of the individual. The first chapter co
... Show MorePurpose: Despite the high clinical accuracy of dynamic navigation, inherent sources of error exist. The purpose of this study was to improve the accuracy of dynamic navigated surgical procedures in the edentulous maxilla by identifying the optimal configuration of intra-oral points that results in the lowest possible registration error for direct clinical implementation. Materials and methods: Six different 4-area configurations were tested by 3 operators against positive and negative controls (8-areas and 3-areas, respectively) using a skull model. The two dynamic navigation systems (X-Guide® and NaviDent®) and the two registration methods (bone surface tracing and fiducial markers) produced four registration groups. The accuracy of the
... Show MoreProduction of fatty acid esters (biodiesel) from oleic acid and 2-ethylhexanol using sulfated zirconia as solid catalyst for the production of biodiesel was investigated in this work.
The parameters studied were temperature of reaction (100 to 130°C), molar ratio of alcohol to free fatty acid (1:1 to 3:1), concentration of catalyst (0.5 to 3%wt), mixing speed (500 to 900 rpm) and types of sulfated zirconia (i.e modified, commercial, prepared catalyst according to literature and reused catalyst). The results show the best conversion to biodiesel was 97.74% at conditions of 130°C, 3:1, 2wt% and 650 rpm using modified catalyst respectively. Also, modified c
... Show MoreThe optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show More