Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
اثر التعلم المنظمي في التمكين الإداري دراسة استطلاعية لآراء عينة في الشركة العامة للصناعات الكهربائية في بغداد
...Show More Authors

This research aims at studying a contemporary and modern phenomenon in the Science of management in general and in the field of organizational behavior in private, The organizational learning and managerial empowerment in a governmental organization :"The General Company of Electric Industries" .The dimensions of organizational learning have been defined (Learning Dynamics، organization transformation, individuals empowerment, knowledge management and Technology application) as wells as the dimensions of managerial empowerment (possessing the information and its availability– Independency and the freedom of conduct and knowledge possession) Information has been gathered by a questionnaire distributed on a sample of professiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Improve the Performance of PID Controller by Two Algorithms for Controlling the DC Servo Motor
...Show More Authors

The paper uses the Direct Synthesis (DS) method for tuning the Proportional Integral Derivative (PID) controller for controlling the DC servo motor. Two algorithms are presented for enhancing the performance of the suggested PID controller. These algorithms are Back-Propagation Neural Network and Particle Swarm Optimization (PSO). The performance and characteristics of DC servo motor are explained. The simulation results that obtained by using Matlab program show that the steady state error is eliminated with shorter adjusted time when using these algorithms with PID controller. A comparative between the two algorithms are described in this paper to show their effectiveness, which is found that the PSO algorithm gives be

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
التجربة الصينية في الإصلاح والتنمية : بحث في خصوصية المنهج والدروس المستخلصة
...Show More Authors

The Chain's experience of reform and development monopolized with deep and exclusive concerns of the world.

Starting from the academic departments of universities and researches and study centers to the world's organizations and institutes passing through the government and the official systems in many countries that get affected , positively or negatively, now or later by china's economic development .

Searching in the china's experience of reform and development  is important because it takes place in a developing country in which the leadership is succeeded in choosing the right methodology an model of changing and operating economics, making use of all the past national a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
الإضاءة في مسرح الطفل تصميم مفترض لمسرحية (الحاسوب)
...Show More Authors

Developed technologies and complementary means for viewing theater through the ages, and they affected would improve and get better. Valsinogravea appeared to express a description and identification of existing in the theatrical space of lighting and decorative structure architecture, and the lighting of the elements that have contributed since ancient times in the process of the show, and played a significant role in strengthening the relationship between the recipient and actor and presentation theater as a whole scenes, working to broadcast a dramatic speech theatrical holds ideas and content and symbols and semantics affect the spectator of different age, particularly the child viewer, that little spectator who represent the

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Psychophysiological Control in Behavior
...Show More Authors

         The Feedback Concept has been spread as an organized trend for scientific research since it has a significant importance for human behavior and how it has been directed and controlled by the individual, feedback has numerous definitions but the simplest definition is; feedback is the information received by the individual from the output of his behavior, In addition to the mutual relationship between the individual and the stimulation that provide him with the basic information by the biological control of his behavior, Since feedback cannot be accomplished without receiving information from the inner and outer environment, the biological and physiological information become the ma

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The role of segment reporting requirements in enhancing the volume of segmental disclosure of the Iraqi corporations
...Show More Authors

The aim of this research was to analyze the financial reporting requirements of segmental information that stipulated by the Iraqi accounting rules, investigating the extent of it compliance with the requirements of the International Financial Reporting Standard No.8 (IFRS 8) and the Statement of Financial Standards No.131 (SFAS 131). Also the research aimed to identify the segmental disclosure practices in listed corporations on Iraq Stock Exchange (ISX), basing on a hypotheses said that “the insufficient  of Iraqi financial reporting requirements of segmental information affect<

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
الاستخدام المشترك لتكنولوجيا المعلومات وإدارة المعرفة لتحقيق قيمة عالية لأعمال البنوك التجارية الأردنية( )
...Show More Authors
  •  

    The problem of the study represented in the gap between what banks possess of Information Technology and Knowledge Management and what they need to help them in decision making and problem solving and achieving High Business Value. It formed a focus and fundamental point for this study in its analysis and interpretation. This was done by a scientific methodology and five chapters.

    The study aimed at analyzing the use of partnering Information Technology with Knowledge Management to achieve High Business Value at commercial banks in Jordan. Data were collected from 116 managers, experts, and advisors working for 16 Jordanian banks through a questionnaire de

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection
...Show More Authors

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
View Publication Preview PDF
Crossref (2)
Crossref