Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Development of improved methods for the synthesis of metal oxide nanoparticles are of high priority for the advancement of material science and technology. Herein, the biosynthesis of ZnO using hydrahelix of beta vulgaris and the seed of abrus precatorius as an aqueaus extracts adduced respectivily as stablizer and reductant reagent. The support are characterized by spectroscopic methods ( Ft-IR, Uv-vis ).The FTIR confirmed the presence of ZnO band. The Uv-visible showed absorption peak at corresponds to the ZnO nanostructures. X-ray diffraction, scaning electron microscopy (SEM), dispersive X-ray spectroscopy (EDX) techniques are taken to investigation the size, structure and composition of synthesised ZnO nanocrystals. The XRD pattern mat
... Show MoreWater level and distribution is very essential in almost all life aspects. Natural and artificial lakes represent a large percentage of these water bodies in Iraq. In this research the changes in water levels are observed by calculating the areas of five different lakes in five different regions and two different marshes in two different regions of the country, in a period of 12 years (2001 - 2012), archived remotely sensed images were used to determine surface areas around lakes and marshes in Iraq for the chosen years . Level of the lakes corresponding to satellite determined surface areas were retrieved from remotely sensed data .These data were collected to give explanations on lake level and surface area fluctuations. It is imp
... Show Moreأثر استراتيجية التدريس البصري باستخدام الانـفوجرافيك في التحصيل والتفكير البصري لدى طلاب المرحلة المتوسطة فـي مادة الرياضيات
Background: Pyogenic granuloma is a hyperplastic benign tumor. The most common intra-oral site is marginal gingiva. It is often occurred in the second decade of life, it has a strong tendency to recur after simple excision.
The aim of study: to evaluate the therapeutic advantages of diode laser (810-980 nm) in intraoral Pyogenic granuloma management.
Materials and method: A total of 28 patients (14 men and 14 females) were enrolled in this study and had their pyogenic granuloma surgically removed using a diode laser. All of the patients were given local anesthetic and went through the identical surgical procedure (cartridge containing 1 percent lidocaine with epinephrine 1:
... Show MoreIn this paper, a statistical analysis compared the pattern of distribution of spending on various goods and services and to identify the main factors that control the rates of spending between the survey of social and economic status of families in Iraq for the year (2007) and the survey of Iraq knowledge net work (IKN) for the year (2011), which were carried out by the Central Bureau of Statistics through the use of factor analysis and cluster analysis, using the ready statistical software package ready (SPSS) to gain access to the results.
A free convective heat transfer from the inside surface of a uniformly heated vertical circular tube has been experimentally investigated under a constant wall heat flux boundary condition for laminar air flow in the ranges of RaL from 6.9108 to 5109. The effect of the different sections (restrictions) lengths placed at the exit of the heated tube on the surface temperature distribution, the local and average heat transfer coefficients were examined. The experimental apparatus consists of aluminum circular tube with 900 mm length and 30 mm inside diameter (L/D=30). The exit sections (restrictions) were included circular tubes having the same inside diameter as the heated tube but with different lengths of
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreThe challenges facing today's multi-customer and this is due to the multiplicity of products and speed in launching new products so search came to reveal the reveal the of the new product classification standards through a relationship (good products, low interest products, useful products and products desired) and the customer emotionally blackmail through deportation (fear, obligation and guilt). dentified the problem of the research in several questions focused on the nature of the relationship between the variables of research, and for that outline supposedly to search it expresses the head of one hypothesis and branched out of which four hypotheses subset, but in order to ensure the validity of the ass
... Show More