Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
A set of hydro treating experiments are carried out on vacuum gas oil in a trickle bed reactor to study the hydrodesulfurization and hydrodenitrogenation based on two model compounds, carbazole (non-basic nitrogen compound) and acridine (basic nitrogen compound), which are added at 0–200 ppm to the tested oil, and dibenzotiophene is used as a sulfur model compound at 3,000 ppm over commercial CoMo/ Al2O3 and prepared PtMo/Al2O3. The impregnation method is used to prepare (0.5% Pt) PtMo/Al2O3. The basic sites are found to be very small, and the two catalysts exhibit good metal support interaction. In the absence of nitrogen compounds over the tested catalysts in the trickle bed reactor at temperatures of 523 to 573 K, liquid hourly space v
... Show MoreIn this paper, a fusion of K models of full-rank weighted nonnegative tensor factor two-dimensional deconvolution (K-wNTF2D) is proposed to separate the acoustic sources that have been mixed in an underdetermined reverberant environment. The model is adapted in an unsupervised manner under the hybrid framework of the generalized expectation maximization and multiplicative update algorithms. The derivation of the algorithm and the development of proposed full-rank K-wNTF2D will be shown. The algorithm also encodes a set of variable sparsity parameters derived from Gibbs distribution into the K-wNTF2D model. This optimizes each sub-model in K-wNTF2D with the required sparsity to model the time-varying variances of the sources in the s
... Show MoreThis manuscript presents several applications for solving special kinds of ordinary and partial differential equations using iteration methods such as Adomian decomposition method (ADM), Variation iterative method (VIM) and Taylor series method. These methods can be applied as well as to solve nonperturbed problems and 3rd order parabolic PDEs with variable coefficient. Moreover, we compare the results using ADM, VIM and Taylor series method. These methods are a commination of the two initial conditions.
In this work, radius of shock wave of plasma plume (R) and speed of plasma (U) have been calculated theoretically using Matlab program.
Volterra – Fredholm integral equations (VFIEs) have a massive interest from researchers recently. The current study suggests a collocation method for the mixed Volterra - Fredholm integral equations (MVFIEs)."A point interpolation collocation method is considered by combining the radial and polynomial basis functions using collocation points". The main purpose of the radial and polynomial basis functions is to overcome the singularity that could associate with the collocation methods. The obtained interpolation function passes through all Scattered Point in a domain and therefore, the Delta function property is the shape of the functions. The exact solution of selective solutions was compared with the results obtained
... Show MoreThe aim of this paper is to present a method for solving high order ordinary differential equations with two point's boundary condition, we propose semi-analytic technique using two-point oscillatory interpolation to construct polynomial solution. The original problem is concerned using two-point oscillatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by comparing with conventional methods.
Drip irrigation is one of the conservative irrigation techniques since it implies supplying water directly on the soil through the emitter; it can supply water and fertilizer directly into the root zone. An equation to estimate the wetted area in unsaturated soil is taking into calculating the water absorption by roots is simulated numerically using HYDRUS (2D/3D) software. In this paper, HYDRUS comprises analytical types of the estimate of different soil hydraulic properties. Used one soil type, sandy loam, with three types of crops; (corn, tomato, and sweet sorghum), different drip discharge, different initial soil moisture content was assumed, and different time durations. The relative error for the different hydrauli
... Show MoreBackground: Thalassemia is a hereditary anemia resulting from defects in hemoglobin production. ?- thalassemia caused by decrease in the production of ?- globin chains affect multiple organs and is associated with cranio-oro-facial deformity which include prominent cheek bones and protrusive premaxilla with depression of the nasal bridge often referred to as “rodent or chip-munk face” with small mandible and Cl.II skeletal relationship. This study aimed to investigate cephalometric craniofacial parameters (skeletal) of ?- thalassemic major patients by using computed tomography and to compare findings with a group of healthy patients in the same age group. Subject, Materials and Method: The study included (40) patients with ?- thalassemi
... Show MoreThis study aimed at investigating the effect of using computer in
Efficiency of Training Programme of Science Teachers in Ajloun District in
Jordan.
1- What is the effect of using computer in program for the two groups
2- ( the experimental and control group ) .
3- Are there any statistics different in the effect of using computer
program for the two groups ?
4- Are there any statistics (comparison ) or different of the effect of the
effect of using computer program refer to the sex (male or female )?
The community of the study consisted of all the science student in
educational directorate of Ajloun district for the academic year 2009 –
2010, they are (120) ( male and female) . The sample of the study<