Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
A simile is a figure of speech that draws resemblance with the help of the words such as (like) or any other closer in meaning word. The present paper deals with the theme of a simile in the poetry of Khwaju Kermani, a truly great Persian poet.
Besides being a great poet, Khwaju Kermani was also a fine professor of sciences. He was, also, known by his ghazals in which he imitated and was influenced by two of the most immense poets (Saadi) and (Hakim Sanai).
The search for knowledge, the pursue of studies and interpretation are among the main themes of Khwaju Kermani’s poetry. He uses ghazals to express love and longing in a mystical manner.
The present paper discusses the poet’s life, ethics and works.&n
... Show MoreDemocracy in any country is measured by the cultural, social and economic level reached by women in it in general and women with disabilities in particular, and the extent of their participation in political life and political decision-making. As a result of the patriarchal power that societies have known, including Iraq, history has witnessed multiple types and forms of discrimination against women, which differed from one country to another, this matter has pushed women and since the beginning of the last century the issue of women's rights has been raised at the global, regional and national levels, through holding international conferences and agreements In order to empower women in all social, economic and political fields.
... Show MoreThe different crises and financial collapses place in many companies, particularly in developed countries as a result of administrative and financial corruption return aspects of the task to the role of the company and the external auditor, both in their emphasis on honesty and fairness of financial statements and the Provisions of accounting information and on the contrary to the truth, you may have to the loss of the rights of stakeholders, particularly existing investors, and the loss of confidence of prospective investors in the accounting information contained in the financial statements of these companies, which led to a crisis of confidence and credibility in the profession of accounting and auditing where the wonder of ma
... Show MoreThis research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with economic concentration. &n
... Show Moreتركت العولمة المتسارعة أثرا عميقا على مدى واسع من السياسات والتطبيقات الاقتصادية في كل من الدول النامية والمتقدمة على حد سواء, إذ نشأت الأنظمة الضريبية الحالية عندما نمّط كل بلد سياسته الضريبية بشكل تركز معه على متطلبات الاقتصاد المحلي, وعندما كانت تعقد المفاوضات بين الأمم المختلفة حول المعاملات الضريبية والاتفاقات الضريبية كانت تجري في إطار من هيمنة السياسة الضريبية المحلية.
لكن العولم
... Show MoreReceipt date:2/17/2021 acceptance date:3/16/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Objective: This paper investigates the contradictions in the decision-making process of the United States, which historically proven to be successful policies in the short term, but in the long term proven to be wanting and failure. Methodology: The paper uses descriptive, historical, comparative method. A
... Show Moreالمقدمة
تمثل الأسعار تعبيرا" نقدياً لقيمة السلع والخدمات المقدمة للزبون، وتعد عملية التسعير من العمليات المهمة وذات الأثر البالغ على نجاح واستمرار منظمات الأعمال، نظراً لما لها من تأثير على المقدرة الربحية وإعادة توزيع الدخل القومي المخصص للاستهلاك، إذ أنه بتحديد الأسعار يستطيع الفرد أن يوزع دخله بين ما يعده ضرورياً من السلع وما يعد كمالياً.
وعموماً فإن لعملية التسعير م
... Show MoreThis research deals with the most important indicators used to measure the phenomenon of financial depth, beyond the traditional indicators, which are called quantitative indicators, which is shown to be inadequate to show the facts accurately, but it may come in the results of a counterfactual, although reliable in econometric studies done in this regard.
Therefore, this research has sought to put forward alternative indicators, is the structural indicators, and financial prices, and availability of financial instruments, and cost of transactions concluded, in order to measure the phenomenon of financial depth.
After using and analyzing data collected from countries the research
... Show Moreالمقدمة ومنهجية البحث
تتفق أغلب الأدبيات ومنها المحاسبية, بأن الخطوة الأولى في وضع وتقييم أي نظام إداري أو محاسبي هي في صياغة أهداف ذلك النظام لما لذلك من أهمية في توفير معيار للحكم على كفاءة التطبيق من عدمه.
وتعرف الأهداف بأنها (النهايات التي تعمل أو توجه النشاطات باتجاهها أو هي النهايات التي تطمح النشاطات تحقيقها). ( 1 ) ..,
كما تعرف أيضا بأنها (الأ
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show More