Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Political Discourse Analysis is an important linguistic study approach used by politicians to gain people support. The present paper sheds light on the figures of speech of emphasis in the televised debate between the two presidential elections candidates, Emmanuel Macron and Marine Le Pen and the distinctive effect they add to the political discourse to win general public support as well as the presidential elections.
The present paper provides a rudimentary definition and an analysis of the terms “discourse” and “political discourse” and traces the significant role played by politically directed televised Media and internet to support political pa
... Show MoreThe current work concerns preparing cobalt manganese ferrite (Co0.2Mn0.8Fe2O4) and decorating it with polyaniline (PAni) for supercapacitor applications. The X-ray diffraction findings (XRD) manifested a broad peak of PAni and a cubic structure of cobalt manganese ferrite with crystal sizes between 21 nm. The pictures were taken with a field emission scanning electron microscope (FE-SEM), which evidenced that the PAni has nanofibers (NFs) structures, grain size 33 – 55 nm, according to the method of preparation, where the hydrothermal method was used. The magnetic measurements (VSM) that were conducted at room temperature showed that the samples had definite magnetic properties. Additionally, it was noted that the saturation magnetizatio
... Show MoreThe reaction of 2-amino-benzothiazole with bis [O,O-2,3,O,O – 5,6 – (chloro(carboxylic) methiylidene) ] – L – ascorbic acid (L-AsCl2) gave new product 3-(Benzo[d]Thaizole-2-Yl) – 9-Oxo-6,7,7a,9-Tertrahydro-2H-2,10:4,7-Diepoxyfuro [3,2-f][1,5,3] Dioxazonine – 2,4 (3H) – Dicarboxylic Acid, Hydro-chloride (L-as-am)), which has been insulated and identified by (C, H, N) elemental microanalysis (Ft-IR),(U.v–vis), mass spectroscopy and H-NMR techniques. The (L-as am) ligand complexes were obtained by the reaction of (L-as-am) with [M(II) = Co,Ni,Cu, and Zn] metal ions. The synthesized complexes are characterized by Uv–Visible (Ft –IR), mass spectroscopy molar ratio, molar conductivity, and Magnetic susceptibility techniques. (
... Show Moret
The research deals with the statement of the importance of unanimous in Islamic Sharia in terms of being the third source of Islamic legislation after the Holy Qur’an and the Sunnah of the Prophet, and the extent of interest of the scholars of interpretation in it, and those who took great interest in mentioning what was agreed upon in every site that necessitated mentioning its issues within, or mentioning an event that has encountered an unanimous, and in various sciences, to extract and extrapolate Sharia rules when these rules are lost in the texts, because it is based on them and derived from them. Among these distinguished scholars is Muhammad bin Jarir al-Tabari. Besides, the research discusses in
... Show Morethe researchers pointed that the poet relied on several means in the form of poetic images, including analogy, and the metaphor with its various elements, The chromatic component has also been used in the formation of its poetic image,and resorted to the correspondence of the senses and the symbol of two types:Self-code, public code : And we find a variety of symbolic stems from different sources, from these symbols, what is religious, including what is historical and what is legendary, and such symbols, which resorted to the rare places of his poems confined to the myths contained in the Bible, His use of the general symbols was ineffective in the poetic picture, relying on the metaphor and metaphor.
six specimens of the Hg0.5Pb0.5Ba2Ca2Cu3-y
Superconducting compound Bi2Sr2-xYxCa2Cu3O10+δ were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi2Sr2Ca2Cu3O10+δ superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th
In this research we solved numerically Boltzmann transport equation in order to calculate the transport parameters, such as, drift velocity, W, D/? (ratio of diffusion coefficient to the mobility) and momentum transfer collision frequency ?m, for purpose of determination of magnetic drift velocity WM and magnetic deflection coefficient ? for low energy electrons, that moves in the electric field E, crossed with magnetic field B, i.e; E×B, in the nitrogen, Argon, Helium and it's gases mixtures as a function of: E/N (ratio of electric field strength to the number density of gas), E/P300 (ratio of electric field strength to the gas pressure) and D/? which covered a different ranges for E/P300 at temperatures 300°k (Kelvin). The results show
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show More