Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the performance of some r- (k,d) class estimators with the (PCTP) estimator that used in estimating the general linear regression model in the presence of autocorrelation and multicollinearity problems at the same time "
...Show More Authors

In the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best esti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 14 2026
Journal Name
Basic Education College Magazine For Educational And Humanities Sciences
Measure awareness Petknlogia the information and its impact on the attainment of knowledge to solve the problems of scientific research material for the students of the fourth stage at the Faculty of Physical Education for Girls
...Show More Authors

يعتقد البعض ان مفهوم العلم يعني الآلات والاجهزة العلمية (تقنيات التعليم) وهي لا تختلف عن مفهوم تكنولوجيا المعلومات , ويعد هذا الاعتقاد خاطئ , لان العلم هو بناء المعرفة العلمية المنظمة والتي يتم التوصل اليها عن طريق البحث العلمي , اما تكنولوجيا المعلومات فهي "التطبيقات العملية للمعرفة العلمية في مختلف المجالات ذات الفائدة المباشرة بحياة الانسان, او هي النواحي التطبيقية للعلم وما يرتبط بها من آلات واجهزة".

View Publication
Publication Date
Mon Dec 19 2022
Journal Name
Journal Of The College Of Languages (jcl)
Evaluation of proverb translation in Nahj al-Balagheh based on the theory of Peter Newmark (Dashti, Shahidi and Foladvand): ارزیابی ترجمه ضرب‌المثل‌ در نهج البلاغه بر اساس نظریه پیتر نیومارک. مطالعۀ موردی: (دشتی، شهیدی و فولادوند)
...Show More Authors

In addition to being a religious book with high human and moral themes, Nahj al-Balagha is considered a mirror of Arab culture and a literary masterpiece at the height of eloquence and eloquence, and because proverbs in the form of short, concrete and understandable phrases for everyone, experiences, thoughts and convey ideas, Imam Ali (AS) used it to facilitate the understanding of various political, social and moral concepts. In this article, we intend to criticize the way Dashti, Shahidi and Foladvand translated it by using Newmark's model due to the importance and cultural reflections of proverbs in understanding the cultural atmosphere governing Nahj al-Balagheh. In his evaluation model, Newmark divides cult

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Employment cost management tools in the fast-track method Of the constructionindustries for the purpose of rationalizing costs: An applied research in the Shatt al-Diwaniya transference project General Authority for projects of irrigation and reclamation
...Show More Authors

The important factor in the success of construction projects is its ability to objective estimate of the cost of the project and adapt to the changes of the external environment, which is affected by a lot of elements and the requirements of the competitive environment. The faces of those projects are several problems in order to achieve particular goals. To overcome these difficulties has been the development of research in the last two decades and turn the focus on the role of the cost of project management, by providing information and assist management in planning and control of the budget among the main elements of the project, namely, (time-cost-quality),The research aims at the possibility of developing and implementing mechanisms

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2024
Journal Name
Medical Journal Of The Islamic Republic Of Iran
The Association of Neutrophil to Lymphocyte Ratio and Other Complete Blood Count Parameters with Global Registry of Acute Coronary Events Risk Score in Patients with Non-ST Segment Elevation – Acute Coronary Syndrome: A Single-Center Study
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Effect of TNF-Alpha Gene Polymorphisms At -376 G/A, -806 C/T, and -1031 T/C on The Likelihood of Becoming a Non-Responder to Etanercept in A Sample of Iraqi Rheumatoid Arthritis Patients
...Show More Authors

Tumor necrosis factor-alpha (TNF-α) antagonists’ therapy are expensive and has a non-responsive rate between 30% to 40% in rheumatoid arthritis patients. Genetic variation plays a vital role in the responsiveness to this type of therapy.The aim of this study is to investigate if the presence of genetic polymorphism in the TNF-α gene promoter region at locations -376 G/A (rs1800750), -806 C/T (rs4248158), and -1031 T/C (rs1799964) affects rheumatoid arthritis patient's tendency to be a non-responder to etanercept.

Eighty RA patients on etanercept (ETN) for at least six months were recruited from the Rheumatology Unit at Baghdad Teaching Hospital. Based on The European League Against Rheumatism response (EULAR) criteria, patient

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (15)
Scopus Crossref
Publication Date
Wed Oct 04 2023
Journal Name
Exergy - New Technologies And Applications
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel

... Show More
View Publication
Crossref
Publication Date
Fri Oct 07 2016
Journal Name
Fourth International Conference On Wireless And Optical Communications, 2016, Beijing, China
ESAM: Endocrine inspired Sensor Activation Mechanism for multi-target tracking in WSNs
...Show More Authors

Target tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The semiotics of the visual image of women in the discourse of empowerment, Saudi Arabia Kingdom as a model
...Show More Authors

We studied, in this paper, the semiotics of the visual image of women in the discourse of empowerment, through three models of advertising images expressing the particularities of the Saudi Arabian environment.

We aim to know how the mark operates and how it is interpreted, as a semantic process in which the meaning ranges from description to interpretation, and we studied two hypotheses:

-The advertising image is a structure in which the mark corresponds to the reality and the discourse to the context.

-The significance is not found in the visual sign or in the textual sign of the advertising image, but in the creative event that opens up to the social, cultural, and psychological context, and creates a field of dia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Fear manufacture in the propaganda discourse image of terrorist ISIS «Daesh» via websites
...Show More Authors

This study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand

... Show More
View Publication Preview PDF
Crossref