Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 25 2012
Journal Name
Synthesis, Characterization And Antibacterial Activities Of Some Metal (ii) Heterocyclic Polyamine Complexes With 6,6'-(1,4-phenylenebis(azanediyl) Bis(2- Amino-6-methyl-6h-1,3-oxazin-4-ol) Ligand.
Synthesis, characterization and Antibacterial activities of some metal (II) heterocyclic polyamine complexes with 6,6'-(1,4-phenylenebis(azanediyl) bis(2-amino-6-methyl-6H-1,3-oxazin-4-ol) ligand.
...Show More Authors

Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change (ijicc)
The relationship between conceptual knowledge and procedural knowledge among students of the mathematics department at the faculty of education for pure sciences/IBn Al-Haitham, university of Baghdad
...Show More Authors

Scopus (26)
Scopus
Publication Date
Sun Sep 01 2024
Journal Name
The Scientific World Journal
Serum Level Alteration of IL‐6, IL‐1<i>β</i>, and IFN‐<i>γ</i> in Groups of Healthy Adults with Oxidative DNA Damage in Najaf Governorate
...Show More Authors

Background. Najaf governorate was recorded as one of the most polluted Iraqi governorates with increased cancer, autoimmune, and abortion cases. Study Groups. A total of 88 adult volunteers from three test groups were divided based on their inhabitance in different geographical regions in Najaf governorate. Group 1 (G1; n, 29) inhabitants of Al‐Ansar, Al‐Abbaseyeh, and Al‐Manathera districts, Group 2 (G2; n, 27) inhabitants of 22 different scattered districts of the governorate, Group 3 (G3; n, 32) inhabitants of Kufa city and center districts in the old Najaf city. According to previous author

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program to Improve some Aspects of Sensory Integration Disorder and Its Effect on Self-Direction Among a Sample of Children with Intellectual Disabilities
...Show More Authors

The present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
“Small wave number and less of Reynolds number inflow analysis in peristaltic transportation of “Hyperbolic tangent fluid” in curved channels by employing the influence of radial magnetic force”
...Show More Authors
Abstract<p>Through this article, we studied the peristaltic motion of “Hyperbolic Tangent” fluid in the geometry of curvature channel by using the analysis of large wavelength and less of Reynolds number. The matter has controlled mathematically by the partial differential equations of continuity, motion, heat transfer. In the study, we used the impact of radial magnetic force. The obtained coupled non-linear equations of above equations have solved by an approximation technical. Locked formula solutions of the stream function, axial velocity, heat function has evaluated. The influence of curvature is analysed and took it into account. The impact of sundry variables on the inflow features ha</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn: 2789-3219 )
The Association of Genetic Polymorphisms in Tumor Necrosis Factor-Alpha and Interleukins with Disease Severity or Response to Biological Therapy in Iraqi Rheumatoid Arthritis Patients: A Narrative Review
...Show More Authors

Background: Tumor necrosis factor-alpha (TNF-α) and interleukins play important roles in the pathogenesis of rheumatoid arthritis (RA). Genetic research has been employed to find many of the missing connections between genetic risk variations and causal genetic components. Objective: The goal of this study is to look at the genetic variations of TNF-α and interleukins in Iraqi RA patients and see how they relate to disease severity or response to biological therapy. Method: Using specific keywords, the authors conducted a systematic and comprehensive search to identify relevant Iraqi studies examining the genetic variations of TNF-α and interleukins in Iraqi RA patients and how they relate to disease severity or response to biolo

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jun 28 2024
Journal Name
Arab World English Journal
Cowboy as a Symbol of Individualism: A Pragmatic Analysis of Red Dead Redemption 2
...Show More Authors

As cultures are mainly divided into collectivistic and individualistic, members tend to emphasize, through communication, either their position as part of their group or their independence from the group. This emphasis is manifested in using the pragmatic concepts of positive politeness and negative politeness. The present study looks into the reflection of these two cultures in Rockstar’s renowned video game, Red Dead Redemption 2 (2018). It aims at identifying the two cultures as present in the game and showing their significance to its narrative. It fills the gap in the studies of language used within video games as well as its cultural reflections. The study addresses the following question: What are the positive and negative

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values
...Show More Authors

Wireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
تقنيات شبكة المعلومات ودورها في إنجاز عمليات الشراء الالكتروني والتسويق الالكتروني* دراسة حالة في شركة بغداد للمشروبات الغازية- المساهمة المختلطة
...Show More Authors

Information Technology has become one of the Most Prominent tools in the Era of Technology and Telecommunication of our Digital World. For that Reasons most Organizations had taken the tools Adapted to their Present and Future Directions and for the Improvement for it's Operations and Workability in Internal or External Enviroment. Consequently the Points of Strength Beats the Weakness and as Result of Increase Opportunities and Decrease the Threats Facing these Organizations. This Search has been made to test the Existence or not Existence role of the Information Network Technologies that Include {Internet and Extranet} in Application of Information Technology t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
The Degree of Knowledge and Use of Authentic Assessment Tools by Basic Elementary Teachers' According to some Variables: أمجد عزات جمعة، شريف عبد الرحمن السعودي، و سلمى علي العلوي
...Show More Authors

Evaluation is one of the most important elements of  teaching process. The recent trends in evaluation and educational reform movements have called for using alternative evaluation, which focuses on performance evaluation. Authentic assessment is usually described as formative, in which students participate in their acquisition, in addition to the fact that students are productive and active, which is reflected in the students' achievement and skill level. The study aims to reveal the degree of knowledge and use of alternative assessment tools by primary school teachers in Gaza -Palestine. To meet the objective of the study, the researchers used the descriptive-analytical method and the questioner as a study tool. The study sample c

... Show More
View Publication Preview PDF
Crossref