Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 30 2025
Journal Name
Journal Of Internet Services And Information Security
Enhancing Lung Cancer Classification using CT Images using Processing Techniques Employing U-Net Architecture
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Mar 27 2021
Journal Name
مجلة دراسات ويحوث التربية الرياضية
Hypoxic exercises by using (training mask) and its effect on the (PMA) and some physiological indicators and achievement for 1500m runners
...Show More Authors

Hypoxic training, which in turn is one of the methods adopted in sports training methods, especially in activities that depend on the aerobic system in its performance, which includes training with a lack of oxygen by reducing its molecular pressure, since this method targets functional organs and works temporary responses during training and permanent responses After training as an adaptation to these devices as a result of training in this way, the study aimed to identify the effect of hypoxic exercises using the training mask and the extent of the change in some biochemical indicators, in addition to that to identify the effect of these exercises on the indicator of energy expenditure and )VMA) and the achievement of the effectiveness of

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Application
Suggested methods for prediction using semiparametric regression function
...Show More Authors

Ferritin is a key organizer of protected deregulation, particularly below risky hyperferritinemia, by straight immune-suppressive and pro-inflammatory things. , We conclude that there is a significant association between levels of ferritin and the harshness of COVID-19. In this paper we introduce a semi- parametric method for prediction by making a combination between NN and regression models. So, two methodologies are adopted, Neural Network (NN) and regression model in design the model; the data were collected from مستشفى دار التمريض الخاص for period 11/7/2021- 23/7/2021, we have 100 person, With COVID 12 Female & 38 Male out of 50, while 26 Female & 24 Male non COVID out of 50. The input variables of the NN m

... Show More
Preview PDF
Scopus
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agriculture And Statistical Science
COMPARISON OF FORECASTING OF THE RISK OF CORONAVIRUS (COVID-19) IN HIGH-QUALITY AND LOW-QUALITY HEALTHCARE SYSTEMS, USING ANN MODELS
...Show More Authors

COVID-19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so helping in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts around the state to arise in the future. These predictions strength helps to make contradiction of likely pressures and significances. Forecasting procedures production a very main character in elastic precise predictions. In this case study used two models in order to diagnose optimal approach by compared the outputs. This study was introduce

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SEPARATION OF PROTEIN AND LACTOSE FROM WHEY DISPOSED FROM ABO-GHRAAB DAIRY FACTORY BY USING MEMBRANE TECHNOLOGY: SEPARATION OF PROTEIN AND LACTOSE FROM WHEY DISPOSED FROM ABO-GHRAAB DAIRY FACTORY BY USING MEMBRANE TECHNOLOGY
...Show More Authors

In this research, the performance of a two kind of membrane was examined to recovering the nutrients (protein and lactose) from the whey produced by the soft cheese industry in the General Company for Food Products inAbo-ghraab.Wheyare treated in two stages, the first including press whey into micron filter made of poly vinylidene difluoride (PVDF) standard plate type 800 kilo dalton, The membrane separates the whey to permeate which represent is the main nutrients and to remove the fat and microorganisms.The second stage is to isolate the protein by using ultra filter made of polyethylsulphone(PES)type plate with a measurement of 10,60 kilo dalton and the recovery of lactose in the form of permeate.
The results showed that the percen

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 10 2021
Journal Name
Design Engineering
Lossy Image Compression Using Hybrid Deep Learning Autoencoder Based On kmean Clusteri
...Show More Authors

Image compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye

... Show More
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
MR Brain Image Segmentation Using Spatial Fuzzy C- Means Clustering Algorithm
...Show More Authors

conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation. 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Monitoring Vegetation Area in Baghdad Using Normalized Difference Vegetation Index
...Show More Authors

       Vegetation monitoring is considered an important application in remote sensing task due to variation of vegetation types and their distribution. The vegetation concentration around the Earth is increase in 5% in 2000 according to NASA monitoring. This increase is due to the Indian vegetable programs. In this research, the vegetation monitoring in Baghdad city was done using Normalized Difference Vegetation Index (NDVI) for temporal Landsat satellite images (Landsat 5 TM& Landsat 8 OIL). These images had been used and utilize in different times during the period from 2000, 2010, 2015 & 2017. The outcomes of the study demonstrate that a change in the vegetation Cover (VC) in Baghdad city. (NDVI) generally shows a

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Crossref