Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using financial and non-financial information ) SASB standards) to enhance investor confidence
...Show More Authors

Companies seek to enhance investor confidence by achieving the highest level of transparency in disclosure of financial and non-financial information (SASB standards) for Iraqi insurance companies listed on the financial market. The aim of the research is to identify the extent of the ability of financial and non-financial information to enhance transparency in reporting, which is reflected in Investor confidence. And the standards of sustainability development accounting issued by (SASB) through the electronic questionnaire that was distributed. Companies seek to achieve a set of goals, the most important of which is to enhance investor confidence by improving transparency in disclosure. Concerning the employment of financial an

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 24 2018
Journal Name
Journal Of Planner And Development
التحليل التركيبي للبنية الحضرية باستخدام نظرية تركيب الفضاء
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Sep 22 2019
Journal Name
Baghdad Science Journal
Estimation of Survival Function for Rayleigh Distribution by Ranking function:-
...Show More Authors

In this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using   is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
تقدير معلمتي التوزيع الاسي العام باستخدام اسلوب المحاكاة
...Show More Authors

The main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular, 

. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation  by using monte carlo simulation techniq

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Excision of Soft Tissue Oral Lesions by 810 nm Diode Laser
...Show More Authors

The present study was conducted on 20 patients suffering from different types of lesion like
pyogenic granuloma, peripheral giant cell granuloma, mucoceles, pregnancy tumour, Fordyce's granules
and irritating fibroma.The cases were selected from outpatient clinic of the Al Kydhemya Teaching
Hospital. Patients were treated by diode laser (810±20 nm) at the affected areas of the oral cavity with
continuous contact focused mode until excision of the lesion with coagulation of the oozing area after
excision. Patients were followed up after 2 days, 7 days and 2 weeks to assess healing process and any
post operative complication. Some of undiagnosed lesion sent for histopathological examination. No
serious complications w

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Removal of Sulfate from Waste Water by Activated Carbon
...Show More Authors

Activated carbon was Produced from coconut shell and was used for removing sulfate from industrial waste water in batch Processes. The influence of various parameter were studied such as pH (4.5 – 9.) , agitation time (0 – 120)min and adsorbent dose (2 – 10) gm.

The Langmuir and frandlich adsorption capacity models were been investigated where showed there are fitting with langmmuir model with squre regression value ( 0.76). The percent of removal of  sulfate (22% - 38%) at (PH=7) in the isotherm experiment increased  with adsorbent mass increasing. The maximum removal value of sulfate at  different pH experiments is (43%) at pH=7.

View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Modified Mathematical Model of Tumor Treatment by Radiotherapy
...Show More Authors

In this research, a mathematical model of tumor treatment by radiotherapy is studied and a new modification for the model is proposed as well as introducing the check for the suggested modification. Also the stability of the modified model is analyzed in the last section.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Some Estimator Methods of Linear Regression Model With Auto-Correlated Errors With Application Data for the Wheat in Iraq
...Show More Authors

This research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012),

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Gulf Economist
The Bayesian Estimation in Competing Risks Analysis for Discrete Survival Data under Dynamic Methodology with Application to Dialysis Patients in Basra/ Iraq
...Show More Authors

Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Engineering And Technology Journal
Face Retrieval Using Image Moments and Genetic Algorithm
...Show More Authors