Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
The adopted method in the teaching of history is conservation and indoctrination in all grades, and this will lead to a lack of students interact with teachers in the course of the lesson, and poor use of teachers to questions that raise students' thinking during the lesson, which leads to a lack of interest in the topic of the lesson and wasting opportunities contribution making it the teacher at the center of the educational process, and to provide arrogating the researcher to contribute to teaching style with the belief that the use of this method of teaching could lead to overcome the difficulties and problems faced by the teaching material.
And there are educational complexes integrated approac
... Show More
The impact of cartoon concepts strategy in the Achievement of the first grade student's average in geography and visual thinking
The study aimed to measure the impact of cartoon concepts strategy to Achievement, visual thinking in the first grade students in the average geographical material.
Find sample consisted of 52 students were divided into two groups, the first experimental studied strategy cartoon concepts and the control group was studied in the traditional manner of parity between the two variables (chronological age, the overall rate, prior knowledge, the degree of intelligence, visual) thinking.
... Show MoreThe research aims to prepare a preliminary feasibility study that shows the importance of preliminary feasibility study in investment decision making, carrying out of the local demand of service provided in accordance with international standards and statement of investment opportunities available to the private sector in several investment methods. In order to reach the objectives of the study was adopted as a method of partial analysis at the level of economic unity through the study demand, supply, costs, economic and social profitability.
The health sector in Iraq is one of the service sectors facing today a continuous deficiency
... Show MoreThe main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona
... Show MoreThe Problem of the research is Limited with the ambguity of environmental work Characterstics role and among them the natural Working Conditions: Temproture, Lighting, Noise, Colours,and Smells, in the Decisions that rule the Planning and Designing work of the industrial Location and it 's targets are Limited with discovering the effect of environmental work Characterstics in planning and designing the industrial Companies and to reach to the most important properties that distinguish the industrial Location Within the frame of dealing with the nature Conditions in the dry, hot regions and the dfining of the relationship between them on the assumption that the Characterstics of environmental work have agreat effect in
... Show MoreAt a time of increasing human potential in the face of crises and risks through the use of technology on a large scale and steadily in various fields of life, and the vulnerability of business organizations as a result of mistakes. The failure of a sudden these errors or omissions or symptoms. Also, some crises occur outside the control of management, others caused by leakage of important information and sometimes secret may be a strategy or a new plan or new project occurs outside the organization to the opposite of what is planned. Therefore, the crisis management are critical to all organizations, because the active management of the crisis helps to ensure the continued prosperity of the organization. Here comes from the resea
... Show More
Abstract
The term public budget defects became nowadays a chronic, economical phenomenon, almost all the countries weather advanced or development country suffered from it, despite the different visions to economic schools of a thought to accept or reject the deficit in public budget but the prevailed opinion that is needed to rule the role of the state by reducing the public spending which led to continuous deficits in public budget and the consequent upon increase in government borrowing, increase taxes on income and wealth, thus weakening the in contrive for private investment which contributed to the increase of in flationary stagnation, it became a duty to state covered by the lack of financial sources
... Show Moreتشكل سوق الاوراق المالية ركناً اساسياً من اركان هيكل النظام التمويلي في النظم الاقتصادية المعاصرة، لما تقوم به هذه الاسواق من دور مهم في حشد المدخرات المحلية وتوجيهها في قنوات استثمارية تعمل على دعم الاقتصاد القومي وتزيد من معدلات الرفاهية الاقتصادية لافراده، فضلاً عن كونها مرأة للوضع الاقتصادي العام في البلاد.
ونتيجة للروابط القوية بين سوق الاوراق المالية والاقتصاد، عُدّ استقرار ونمو
... Show MoreThe objective of the research , is to shed light on the most important treatment of the problem of missing values of time series data and its influence in simple linear regression. This research deals with the effect of the missing values in independent variable only. This was carried out by proposing missing value from time series data which is complete originally and testing the influence of the missing value on simple regression analysis of data of an experiment related with the effect of the quantity of consumed ration on broilers weight for 15 weeks. The results showed that the missing value had not a significant effect as the estimated model after missing value was consistent and significant statistically. The results also
... Show Moreتعمل البنوك والمؤسسات المالية كوسيط مالي بين أصحاب المدخرات والودائع من جهة ومستخدمي هذه الأموال من جهة أخرى، وممارسة هذه الوساطة المالية بين الطرفين توضح العلاقة التي ينشأ عنها الائتمان، فالائتمان علاقة بين طرفين أولهما تزيد موارده على احتياجاته وهم (المدخرون) والثاني تزيد احتياجاته على موارده وهم (المقترضون)، وطبيعة العلاقة التي تنشأ بينهما تأخذ أحد شكلين: مباشر دون وساطة من أي طرف خارجي، أو غير مباشر عن
... Show More