Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
معالجة التضخم في الاقتصاد العراقي
...Show More Authors

لا يتسع هنا المجال لأستعراض كامل الخلفيات التاريخية التي انتجت اوضاعنا الاجتماعية والاقتصادية والسياسية المتأزمة الحالية، وجل ما يمكن قوله هو ان الشعب العراقي وخلال ما يربو على ربع قرن لم يحصد سوى عدد من الحروب والعقوبات الدولية فالازمات التي ولدت الرعب والجوع المستمر للشعب حتى يومنا هذا.

لقد كان الاقتصاد الوطني اول واكبر المتضررين من تلك الازمات ومن سياسات الدولة غير العقلانية فكانت ال

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Consider speech science in light of its purposes
...Show More Authors

Considering the science of speech in the light of its purposes is an accurate scientific study that looks at it from its reality in which it originated, and its topic that it dealt with and its goals that it sought, and it follows its main course in the directions of approving the belief and inferring it, and repelling the objections to it, and this study comes to show the realism of the science of speech in its emergence Its subject and method, since its launch was from the reality of the Islamic nation and based on its intellectual needs, so its presence was necessary in the life of the Islamic nation because of its role in facing the challenges faced by the Islamic faith, and the dangers it was exposed to as a result of the intellectu

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (48)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Classification of fetal abnormalities based on CTG signal
...Show More Authors

The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The strengthening of strategic intelligence through an applied effective reality survey of strategic information systems An applied research in mobile companies in the Kurdistan Region
...Show More Authors

Abstract

Purpose: The research attempts to Stand on the reality of the effective application of of strategic information systems in telecommunications companies in the Kurdistan Region, and what is the amount of the impact of such systems on promoting of Strategic Intelligence.

Design/Methodology/Approach: The Applied method has been used, In order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then distributed to (11) Company of Iraqi communications operating in Kurdistan Region companies, it has been used questionnaire to collect data in order to develop

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 06 2023
Journal Name
Materials Science Forum
Study of the Effect of Ce <sup>3+</sup> on the Gas Sensitivity and Magnetic Properties of Cu<sub>x</sub>Ce<sub>0.3-X</sub>Ni<sub>0.7</sub>Fe<sub>2</sub>O<sub>4</sub> Ferrite Nanoparticles
...Show More Authors

This study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
دراسة في مصداقية العائد على الاستثمار كمؤشر مالي لأسهم الشركات المدرجة في أسواق البورصة
...Show More Authors

لطالما تُبنى قرارات الاستثمار في أسهم الشركات المدرجة في أسواق البورصة على خلفية المؤشرات المالية لها والتي عادةً مايتم إصدارها في نشرات سنوية معتمدة من قبل تلك الاسواق، إذ غالباً مايقوم المحللون الماليون بالاستعانه بها لتوجيه المستثمرين لإتخاذ القرارات المتعلقة بشراء أو بيع أسهم هذه الشركات.

لكنه على الرغم من ذلك تحدث إنهيارات كبيرة في أسواق البورصة بين فترة وآخرى وخير مثال على ذلك ما أ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تحليل فاعلية الشمول المالي لمعالجة الفقر في العراق مع إشارة الى التجربة النيجيرية
...Show More Authors

The focus of this research lies in the definition of an important aspect of financial development, which is reflected on the alleviation of poverty in Iraq, namely financial inclusion and then taking the path of achieving a sustainable economy, certainly after reviewing one of the important international experiences in this regard and finally measuring the level of financial inclusion in Iraq and its impact on poverty reduction through the absolute poverty line indicator.

View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Modern Applied Science
A New Method for Detecting Cerebral Tissues Abnormality in Magnetic Resonance Images
...Show More Authors

We propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). St

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
Exploitation of the Democratization of Language in the Mass Media: Тенденция к демократизации языка в сми
...Show More Authors

      In the present paper, the features of democratization of vocabulary in the language of mass media are tackled. Particularly, the functions of this phenomenon in the context of language as an ontological reality are analysed. As well, the growing role  of the language of the media, and the language of politics as an integral part pertaining to it, is noted. Further, attention is paid to the excessive saturation of the language of the media along with the literary language, by means of evaluation which may include negative results.

     In this concern, scholars had different views, specifically in relation to the use of colloquial vocabulary along with some vernacular profess

... Show More
View Publication Preview PDF
Crossref