Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.
The biosorption of Pb (II), Cd (II), and Hg (II) from simulated aqueous solutions using baker’s yeast biomass was investigated. Batch type experiments were carried out to find the equilibrium isotherm data for each component (single, binary, and ternary), and the adsorption rate constants. Kinetics pseudo-first and second order rate models applied to the adsorption data to estimate the rate constant for each solute, the results showed that the Cd (II), Pb (II), and Hg (II) uptake process followed the pseudo-second order rate model with (R2) 0.963, 0.979, and 0.960 respectively. The equilibrium isotherm data were fitted with five theoretical models. Langmuir model provides the best fitting for the experimental results with (R2) 0.992, 0
... Show MoreIn recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor
... Show MoreDifferent injection material types were tried in the injection of soft clay, such as lime (L), silica fume (SF), and leycobond-h (LH). In this study, experiments were made to study the effect of injection on soft clay consolidation settlement. A sample of natural soft clayey soil was investigated in the laboratory and the sample was injected with each of the grout materials used, L, SF, L + SF, and L + SF + LH. A 20 cm3 of each slurry grout was conducted into the soil, which was compacted in California Bearing Ratio (CBR) mold and cured for 7 days, and then the sample was loaded to 80 N load by a circular steel footing 60 mm in diameter. The settlement was r
The most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreCadmium is one of the heavy metal found in the wastewater of many industries. The electrocoagulation offers many advantages for the removal of cadmium over other methods. So the removal of cadmium from wastewater by using electrocoagulation was studied to investigate the effect of operating parameters on the removal efficiency. The studied parameters were the initial pH, initial concentration, and applied voltage. The study experiments were conducted in a batch reactor with with two pairs of aluminum electrodes with dimension and 2mm in thick with 1.5 cm space between them. The optimum removal was obtained at pH =7, initial concentration = 50 mg/L, and applied voltage = 20 V and it was 90%.
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.