Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
تلعب السياسة النقدية دوراً فاعلاً ومتميزاً في تحقيق معدلات نمو عالية وتحقيق الاستقرار والتوازن الاقتصادي وبالاخص الحد من ظاهرة التضخم.
يمكن حصر اهداف السياسة النقدية في الدول النامية والعربية خصوصاً من خلال التعرف على الاغراض المنصوص عليها في التشريعات وتشمل (تحقيق استقرار نقدي، المحافظة على قيمة العملة، تشجيع النمو الاقتصادي، تطوير الاسواق المالية والنقدية، استقرار الاسعار، تحقيق ال
... Show Moreنتيجة للتطورات الأخيرة في أبحاث الطرق السريعة بالإضافة إلى زيادة استخدام المركبات، كان هناك اهتمام كبير بنظام النقل الذكي الأكثر حداثة وفعالية ودقة (ITS) في مجال رؤية الكمبيوتر أو معالجة الصور الرقمية، يلعب تحديد كائنات معينة في صورة دورًا مهمًا في إنشاء صورة شاملة. هناك تحدٍ مرتبط بالتعرف على لوحة ترخيص السيارة (VLPR) بسبب الاختلاف في وجهة النظر، والتنسيقات المتعددة، وظروف الإضاءة غير الموحدة في وقت الحصول
... Show MoreThis paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show MoreFootball has progressed from being a ritual and a celebration to become an amateur sport, a professional sport, and now, increasingly, a commercial sport. In the analysis of football business model, the systemic approach should be adopted. If sport is regarded as one of the business sectors, then the application of business system methodology can be fully justified. The interest to create strong football business system calls for the search of the ways of popularizing football business model and boosting the economic potential of its participants. In the research literature tend to ignore the business processes within the sports business. Besides, the systemic approach in football business is usually limited to p
... Show MoreThe present study aims at knowing the effect of discussion method for students of fifth grade in preparatory school.
Methodology of the Study:
In order to achieve the objective of the study, the researcher chooses non-randomly the preparatory school affiliated to the District Chamchamal \ Suliemnaniya. The sample attained 64 students in 32 per group (control and experimental) groups. The researcher used the discussion method which was applied on experimental group. She uses the traditional method on the control group.
The researcher matched the two group in ago, intelligence, marks at the Kurdish Language in the previous year , pretest and posts for the indepe
... Show Moreالتعريف بالبحث
اهمية البحث والحاجة اليه :.
اللغة وظيفة اساسية الا وهي التواصل ولقد زدادت الحاجة في هذا العصر الى تعلم اللغات والاحاطة بها اكثر من اي وقت مضى يوصفها الاساس الذي يعتمد عليه في تعلم المواد الاخرى .
فاللغة اداة التفكير ونشر الثقافة في بلدان كثيرة مثل بلاد الاندلس التي اشرقت منها الحضارة في ا
... Show MoreGod created man with a social nature, that is, man cannot live alone, but there must be a society associated with him. And when God addressed Adam, the first of His creation, he addressed him with the speech of the Muthanna to him and his wife. “This tree, then you will be among the wrongdoers” (Al-Baqara: 35), and thus was the divine discourse for the first human experience on earth. It accommodates a social relationship, which is (the family), husband and wife. And since a person needs to meet, as Ibn Khaldun said: (The human meeting is necessary, and the wise men express this by saying (the human being is of course civil)) (). And as it is known that with the meeting, relations arise from love and hate, cooperation and struggle, a
... Show MoreChapter One – introduction
Nations managed today to achieve progress in the field of modern technology. Science has changed many beliefs and trendiness that people have held for long time, skills and scientific thinking developed, and made scientific observation and experiment replace narration and taking from others. That is attributed to examining the educational systems searching for the locations of defect, and shortage.
In the light of educational modernizations, many models of teaching incliuding a model for social tracing attributed to Herbart Thelen, which is a model to develop skills of social participation in the democratic process (Al-Khawalda,1993,335).
... Show More
Praise be to God who has guided us, and we would not have been guided had it not been for the guidance of God Almighty. The life of the Commander of the Faithful, Imam Ali bin Abi Talib, peace be upon him, represented the highest meanings of sacrifice, redemption, courage, heroism, patience, altruism, and truth, which were embodied in his unique personality, whose counterpart is rare, if not unparalleled in history. Except for the person of the Holy Prophet Muhammad (may God bless him and his family and grant them peace). In this research, we have presented pictures from the life of Imam Ali bin Abi Talib (peace be upon him), as we have clarified his life, upbringing, conversion to Islam and his ma
... Show MoreRights of child in the community crisis Iraqi child model The study aimed to identify the types of violation against children in the Iraqi crisis as well as to develop community coping mechanisms to these violations and promote the rights of the child health psychological , social and legal . the first chapter discusses the research problem and its importance and purpose of the research problem and its importance and purpose of the research and the most important terms in the A- Rights of the child ,B- crisis , chapter 2 rights of the child ensure the historical roots , of children’s rights in the holy quran and the sunnah, and legal rights through the twentieth century and the beginnings of century xx, the se through the twentieth cen
... Show More