Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Research indicates that the second half of the twentieth century marked large interests in the service industry by government and private organizations in that one, and the service industry has become the bedrock of plans in achieving economic and social development. From this standpoint felt specialists and researchers the importance of transport modes, including rail, which should be available between Almnltq Civil populated as services organized by the competent authorities to achieve the active participation of citizens in economic and social development in the region and that the term services means economic activities, which are the results Pollack concrete such as accepting the situation and satisfaction them or satisfacti
... Show MoreThe importance of the study stems from the fact that Iraq’s economy is facing a housing crisis, especially in the Iraqi capital, Baghdad, great demographic pressure due to pronounced population growth over the past two decades. The Central Bank of Iraq undertakes several initiatives represented in granting real estate loans, mainly through the Real Estate Bank at very low interest, and in the last two years, the interest has become zero. The purpose of the study is to analyze the fiscal implications of the Iraqi central bank’s real estate initiatives, as well as its real impact on the spatial dimension of the Iraqi governorates through new housing in those governorates. Using data mainly from the Central Bank of Iraq’s bulleti
... Show MoreMulti-spectral satellite images of the Landsat satellite by the tow sensitive Thematic Mapper (TM) and Thematic Mapper Enhancement (ETM+), which covered the study area located south east of Iraq. In this research; used the sixth thermal spectral band (Thermal Band) for study the water cover in the AlRazzaza Lake located within the province of Karbala. We intended to study the cover a case of the study area, used satellite images showing the status of region during the period from 1990 to 2001 and 2007. From this study we conclude that cover the water of the study area change in sequence case to decrease during these years.
This research involves design and simulation of GaussianFSK transmitter in UHF band using direct modulation of ΣΔ fractional-N synthesizer with the following specifications:
Frequency range (869.9– 900.4) MHz, data rate 150kbps, channel spacing (500 kHz), Switching time 1 µs, & phase noise @10 kHz = -85dBc.
New circuit techniques have been sought to allow increased integration of radio transmitters and receivers, along with new radio architectures that take advantage of such techniques. Characteristics such as low power operation, small size, and low cost have become the dominant design criteria by which these systems are judged.
A direct modulation by ΣΔ fractional-N synthesizer is proposed
... Show MoreIn this study , Iraqi Bentonite clay was used as a filler for polyvinyl chloride polymer. Bentonite clay was prepared as a powder for some certain particle size ,followed by calcinations process at (300,700,900) OC ,then milled and sieved. The selected sizes were D ~75 µm and D ~150. After that polyvinyl Al-Cohool solution prepared and used as a coated layer covered the Bentonite powder before applied as a filler ,followed by drying , milling and sieving for limited recommend sizes. polyvinyl chloride solutions were prepared and adding of modified Bentonite power at certain quantities were followed .Sheet of these variables on the mechanical and thermal properties of the prepared reinforced particular polyvinyl chloride composite
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreKE Sharquie, AA Noaimi, SA Galib, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 4
A fast laser texturing technique has been utilized to produce micro/nano surface textures in Silicon by means of UV femtosecond laser. We have prepared good absorber surface for photovoltaic cells. The textured Silicon surface absorbs the incident light greater than the non-textured surface. The results show a photovoltaic current increase about 21.3% for photovoltaic cell with two-dimensional pattern as compared to the same cell without texturing.