7 research outputs found

    Information Hiding using LSB Technique based on Developed PSO Algorithm

    Get PDF
    Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color sub-bans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise

    Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach

    Get PDF
    تتزايد أهمية أمن المعلومات في تخزين البيانات ونقلها. من جانب اخر يتم استخدام الصور في العديد من الإجراءات. لذلك ، يعد منع الوصول غير المصرح به إلى بيانات الصورة أمرًا بالغ الأهمية من خلال تشفير الصور لاجل حماية البيانات الحساسة او الخصوصية. تتنوع طرق وخوارزميات إخفاء الصور أو تشفيرها من طرق المجال المكاني البسيطة إلى طرق مجال التردد والذي يعتبر الأكثر تعقيدًا وموثوقية. في هذا البحث ، نقترح نظام تشفير جديد يعتمد على منهجية تهجين مولد المفتاح العشوائي من خلال الاستفادة من خصائص DCT لتوليد مجموعة غير محددة من المفاتيح العشوائية والاستفادة من معاملات المنطقة منخفضة التردد بعد مرحلة DCT لتمريرها إلى نظام فرعي يتكون من مجموعة RLG للحصول على المفاتيح السرية التي يتم تمريرها إلى RSA لتنتهي بتشفير الصورة. تشير النتائج إلى أن الطريقة المقترحة لها القدرة على تولد مجموعة كبيرة جدًا من المفاتيح السرية شديدة التعقيد والآمنة التي يمكن استخدامها لاحقًا في مرحلة التشفير. علاوة على ذلك ، سيتغير عدد وتعقيد تلك المفاتيح في كل مرة يتم فيها تغيير الصورة، وهذا يمثل مساهمة الطريقة المقترحة. ولم نلاحظ اي ضياع للوقت أثناء عمليات التشفير وفك التشفير لاستخدامنا RLG ، مما يدل على أن النظام المقترح قام بعمل جيد في صنع مفاتيح مختلفة من نفس الصورة. ويختلف في قوة المفتاح من صورة إلى أخرى حسب طبيعة الصورة الملونة.Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge

    Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network

    Get PDF
    Image encryption has become an important application aspect of information security. Most attempts are focused on increasing the security aspect, the quality of the resulting image, and the time consumed. On the other hand, dealing with the color image under the spatial domain in this filed is considered as another challenge added to the proposed method that make it sensitivity and difficulty. The proposed method aims to encode a color image by dealing with the main color components of the red (R), green (G), and blue (B) components of a color image to strengthen the dependence of each component by modifying a two dimensional logistic- sine coupling map (2D- LSCM). This is to satisfy the statistical features and reduce time-consumption, and benefit from a mixing step of the second of advanced encryption standard (AES) candidates (serpent block cipher) and modified it to achieve in addition of confusion and diffusion processes. The experimental results showed that our proposed method had the ability to resist against statistical attacks and differential attacks. It also had a uniform histogram, a large key space, complex and faster, closer Shannon entropy to 8, and low correlation values between two adjacent pixels compared with other methods

    Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit

    Get PDF
    Information security is one of the most important branches concerned with maintaining the confidentiality and reliability of data and the medium for which it is transmitted. Digital watermarking is one of the common techniques in this field and it is developing greatly and rapidly due to the great importance it represents in the field of reliability and security. Most modern watermarking systems, however, use the self-organization map (SOM), which is safer than other algorithms because an unauthorized user cannot see the result of the SOM's training. Our method presents a semi-fragile watermark under spatial domain using least significant bit (LSB) and by relying on most significant bit (MSB) when the taken values equal to (2 or 4 bits) depending on the characteristics of SOM through developing the so-called best matching unit (BMU) which working to determine the best location for concealment. As a result, it shows us the ability of the proposed method to maintain the quality of the host with the ability to retrieve data, whether it is a binary image or a secret message

    Improve the Growth and Yield of Figs by Foliar Nutrition at Post-Harvest

    Get PDF
    A factorial experiment was carried out by spraying the fig (Ficus carica L.) trees cv. Aswad Diyala at post-harvest in the 2014 and 2015 seasons, in one orchards of Diwaniyah city/ Iraq, with two liquid fertilizers: Azomin and Prosol at 3 levels (0, 3 and 6) g.l-1 and (0, 2 and 4) g.l-1, respectively. The results showed that third level of both fertilizers gave The widest leaf area:{(5.53, 6.42) and (5.52 , 6.38)}m2.tree-1, highest leaf content of chlorophyll {(131.63 ,132.55) , (132.63 , 130.93)}mg.100g-1 more N percent of leaf {(2.12 , 2.11) , (2.31, 2.34)}%, highest carbohydrates percent of leaf {(14.65 , 15.10) , (14.83, 15.02)}%, for compounds and seasons, respectively. As for the crop that took place in the 2015 and 2016 seasons gave the highest yield{(20.50, 21.66) (20.80, 21.30)}kg.tree-1, most level of K in the fruit{(280.10, 272.70), (292.40, 288.10)}mg.100g-1 and highest content of anthocyanin{(512.10, 519.90), (482.90, 494.50)} mg.100g-1. There was a significant interaction between the experimental factors, which reached a peak in the third level, in the leaf area in the 2014 and 2015 seasons (5.85 and 6.86) m2.tree-1, and the anthocyanin in the 2015 and 2016 seasons in fruit (518.20 and 534.80) mg.100g-1, respectively. It can be concluded that the post-harvest spraying of Aswad Diyala cv., with the, Azomin and Prosol at the levels of 6 and 4g.l-1, respectively, gave the best results.

    Palmitic acid-based amide as a corrosion inhibitor for mild steel in 1M HCl

    No full text
    Due to growing environmental concerns and regulations limiting the use of harmful and toxic synthetic corrosion inhibitors, there is a high demand for sustainable corrosion inhibitors. In this study, a green and rapid technique was used to synthesize amide N-(4-aminobutyl)palmitamide (BAPA) which yielded 91.17% of the product within 2 min, compared to a low yield of 75–80% and a very long 8–10 h reaction time with the conventional thermal condensation method. The chemical structure of BAPA was analyzed by FT-IR, 1HNMR and 13CNMR spectra, as well as CHNS elemental analysis. When applied to mild steel exposed to 1 M HCl, BAPA delayed and reduced corrosion by adsorbing to the steel surface to form a protective layer. The inhibition efficiency increased with increasing amide concentration, and maximal inhibition of 91.5% was observed at 0.5 mM BAPA. The adsorption of BAPA on mild steel in an acidic solution was studied and inhibition performance was correlated with the calculated adsorption-free energy ΔGads, indicating good agreement between the experimental and adsorption findings. Surface morphology of untreated and treated mild steel coupons was evaluated by SEM, and based on density functional theory (DFT) computations and atomic charges analysis, a stronger interaction was observed between BAPA and mild steel surface leading to the formation of a compact protective film on the metallic surface. This protective film is attributed to the presence of nitrogen atoms and carbonyl group in the chemical structure of BAPA

    Global economic burden of unmet surgical need for appendicitis

    No full text
    Background There is a substantial gap in provision of adequate surgical care in many low- and middle-income countries. This study aimed to identify the economic burden of unmet surgical need for the common condition of appendicitis. Methods Data on the incidence of appendicitis from 170 countries and two different approaches were used to estimate numbers of patients who do not receive surgery: as a fixed proportion of the total unmet surgical need per country (approach 1); and based on country income status (approach 2). Indirect costs with current levels of access and local quality, and those if quality were at the standards of high-income countries, were estimated. A human capital approach was applied, focusing on the economic burden resulting from premature death and absenteeism. Results Excess mortality was 4185 per 100 000 cases of appendicitis using approach 1 and 3448 per 100 000 using approach 2. The economic burden of continuing current levels of access and local quality was US 92492millionusingapproach1and92 492 million using approach 1 and 73 141 million using approach 2. The economic burden of not providing surgical care to the standards of high-income countries was 95004millionusingapproach1and95 004 million using approach 1 and 75 666 million using approach 2. The largest share of these costs resulted from premature death (97.7 per cent) and lack of access (97.0 per cent) in contrast to lack of quality. Conclusion For a comparatively non-complex emergency condition such as appendicitis, increasing access to care should be prioritized. Although improving quality of care should not be neglected, increasing provision of care at current standards could reduce societal costs substantially
    corecore