Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
The research has handled an important service sector in Iraq which is the municipals sector since it is connected directly and closely with the services presented to the citizens, and because the process of accomplishing the projects needs planning and scheduling for implementing these projects according to the available financial allocating and it was no choice but finding modern methods that help succeeding the processes of planning through making use of Geographic Information system (GIS) in providing the necessary information in scheduling the projects since it is considered as one of the tools that conveys the occurred in collecting the huge amount of the locative d
... Show MoreEnergy crisis and the requirements of health and feel good, all this renewed attention to the importance of natural lighting in all kinds of factories.
Research problem was how to achieve the plant's own natural outlets visual comfort and satisfaction of workers in Companies, the industries of cotton and general al-fedaa.
The research compuns address the impact of daylight to provide visual comfort in the factory. Indeed, the light must be treated very carefully, and natural lighting should be thinking from the perspective of the occupants of the plant and not wishing to view from the outsid
... Show MoreThe research explores the shapes preferred by children and the extent to which it can be utilized on the experimental kindergarten at the Woman’s School of Education. To achieve the goal, the researcher has displayed pictures that have been chosen from within the research boundaries which represent four categories: Geometrical shapes which included (squares, rectangles, triangles, and circles), agricultural shapes which included (apples, oranges, bananas, and grapes), motion pictures shapes (cartoon characters) which included (Jerry the mouse, Twitty the bird, Bugs Bunny the rabbit, and Winnie the pooh), and animal shapes which included (dogs, fishes, frogs, and horses) to the sample children of (60) child (boys and girls) that
... Show More That analytical procedures are of analytical tools important because it gives assurance to the auditor-free financial statements of the economic units replace the audit of cases offraud and errors and distortions, and thereby to increase the effectiveness of the audit process and confirm the possibility oftrust and reliance on the financial statements that Adfgaha auditor.
Inspite of identify evidence of proof necessary to enhance the auditor's opinion the results reached in the audit p
The current research aims to study (the effect of strategy of analysis - synthesis duality in the collection of scientific fourth stage students and high-order thinking in Biology material). For evidence the objective of the research, the researcher formulated the following two null hypotheses: 1. There is no significant difference at the statistical level (0.05) between the average of scores of the experimental group students that will study according to the dualism strategy of analysis and structure and the average of scores of the controlled group students that will study according to the normal way in the collection. 2. There is no significant difference at the statistical level (0.05) between the average of scores of the experimenta
... Show MoreThe goal of current research is to identify the difficulties in the application of modern physics in the middle schools of the province of Baghdad schools from the perspective of teachers of physics trends, sample search of (127) teachers, Karkh Third Directorate, and use Researcher questionnaire data collection tool after applying it to teachers who have experience (5) years and more after confirmation of the validity and reliability of the scale (the tool) researcher has used the averages for the purpose of interpreting the results. the results showed that the difficulties have been in the order following: (difficulties related educational environment of modern trends of teaching, curriculum-related dif
... Show MoreThe main target of this paper is to determine the optimum time for preventive maintenance on machines. Tow methods has been implemented estimating the optimum time duration for preventive maintenance . the first techniques use scheduling depending on data concerning the machine maintenance cost and halted cost from the production reach to the optimum time for maintenance which reflect the minimum cost. Where as the second techniques depends on reability function to estimate the optimum duration time which reflect the minimum cost. The tow techniques above by which we count on in fixing the preventive maintenance both give same result . we also prove that the scheduling method best than the reability function .
This study aims at measuring the sectarian prejudice attitude with sample of college student and secondary school students. It also aims at detecting the impact of similarities and differences of the sectarian belief with the parents on the development of sectarian prejudice with their parents according the following variables (gender,grade,achievement of the parents).
The study restricted by a sample consists of (Baghdad,Al-mustansiriya,and Al-Qadisiyah) students and the fourth grade students (males and female). To achieve the goal of this study , the researcher built atoll to measure the sectarian prejudice attitude after verifying its psychometric characteristics , after analyzin
... Show MoreThere are many varied studies that dealt with the dramatic construction, especially books and studies that addressed drama in its construction and the method of writing it, that no textbook or a general cultural content is void of tackling the dramatic text in its construction and how the dramatic action develops in it. Therefore, a question occurs to the mind about the feasibility of dealing with the dramatic construction in this time, where many contemporary studies of dramatology and its relation and the contemporary critical directions are accumulating. This question many have two realistic aspects, yet the novelty and originality that this research shows lie in addressing a refined linguistic text in its style and connotations, such
... Show Moreاستهدفت هذه الدراسة تحليل واقع الاقتصاد العراقي على خلفية تحليل القدرة التنافسية بما يفضي الى وضع ملامح عامة لإستراتيجية بناء للقدرة التنافسية الوطنية للنهوض بالواقع الاقتصادي. وقد افترضت الدراسة ان الاقتصاد العراقي يعاني من اخفاقات شديدة في الاداء لا تتصل بطبيعته ولاتعتبر سمة اصيلة من سماته بل هي ظرفية وطارئة رغم وجودها منذ عقود.
ان حالة الوهن المرافق للفعاليات الاقتصادية تتصل بغيا
... Show More