Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
The research study aims to investigate the prevalence of the phenomenon of drags and the causes of this phenomenon from the teachers point of view Two hundred Teachers participated in this study Questionnaire was used to collect the data .
The results emphasized the importance 0f the educational counseling through different procedure to prevent drugs abuse . the results also&
... Show MoreIn this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
Still Financial institutions, including banks, a key target for money launderers to transfer illicit funds to the legitimate funds and by weaknesses in the internal audit procedures applied in the banks or through a lack of legal structure to combat this phenomenon in addition to the procedures by other regulations
T
... Show MoreAbstract
Objective(s): To evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status.
Methodology: A descriptive design is employed throughout the present study to evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status from November 3rd 2017 to June 30th 2018. A purposive “nonprobability” sample of (101) housekeeping staff is selected for the present study. An instrument is constructed for the purpose of the study and it is consists of (2) parts: (I) Evaluation of work environment, and (II) Evaluation of housekeeping st
Unter dem Titel " Technische Methoden im Fremdsprachunterricht als eine neueste Methode im Fremdsprachlernen, die Spiele als Muster"
versteht man, dass die Forschung sich mit einer neuen Methoden im Fremdsprachunterricht beschäftigt. Von den neuen Methoden im Unterricht sind die Spiele. So man sieht in den letzten Jahren viele Artikel zum Thema Spiele im Fremdsprschunterricht. Davon gehen wir aus, dass die Spiele im Unterricht eine groβe Rolle spielt, denn diese Methode macht Lust, Spaβ im Lernenprozeβ. Die Spiele im Unterricht bezeichnen als ein Mittel, um Unterricht etwas Schönes , Nützliches und Lebendigs zu sein. Die Spiele sind vielfälltig und unterscheidet sich nach den Themen und Materialien. In dieser F
... Show MoreReligion in its general and simplified form is defined as a set of values or moral laws, which include provisions that people should follow to organize their affairs and ratify that they are provisions sent from the divine.
The concept of religion is not limited to the narrower sense represented by the performance of the virtual rituals of worship and religious fashions, etc., but also includes all the moral and spiritual values, conduct and good dealing that reflect the true essence of religion, which boils down to a set of values – such as sincerity, honesty and dedication to work, merciful dealing and compassion, etc. All religions agree on the moral content of religion. The Prophet of Is
... Show MoreBusiness incubator is a new effective mechanism in developing small projects through its introductions of a new integral system of services. It aims at supporting and developing making new projects. Hence, there is a big number of factors that are interrelated in the processes of preparation for those projects. Those factors are: organizing the incubator and the market available for the projects attached to them and the work programs which will have to be implemented. Those small projects represent more than 98% of the total work institutions in the world. Also it has become responsible for a ration reaching half of the national output of those countries. These projects have created between 40 to 80% of job opportunities availabl
... Show Moreفي تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
The issue of freedom is the most prominent and distinctive issue of Western thought, which it reached after a long struggle. The English thinker John Stuart Mill is considered the most prominent Western thinker who elaborated on the issue of freedom, until his ideas on the issue of freedom became the semi-final formula for issues of freedom in Western thought, which revolve in their entirety on The individual has complete freedom as long as it does not harm others, and this freedom is controlled by law.
And if the freedoms he offered were not considered an achievement in Western thought; Freedom in Islam is a central and fundamental issue, and the details of freedoms in Islam have not been accomplished by anyone, but rather came
... Show MoreAlternative distribution to estimate the Dose – Response model in bioassay excrement
This research concern to study five different distribution (Probit , Logistic, Arc sine , extreme value , One hit ), to estimate dose –response model by using m.l.e and probit method This is done by determining different weights in each distribution in addition find all particular statistics for vital model .