Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Background: Removal of bacteria from the pulp system by instrumentation of an infected root canal, will be significantly reduced the number of bacteria, but it is well documented that instrumentation alone can-not clean and kill all bacteria found on the root canal walls. Antibacterial irrigants are needed to kill the remaining microorganisms. The aims of this study was to assess antibacterial effect of titanium tetrafluoride (TiF4) solution and brewing green tea against root canal bacteria and to compare with sodium hypochlorite and normal saline through microbiological and molecular studies. Materials and methods: Microbiological study was carried out to determine the concentration of titanium tetrafluoride and brewing green tea at which
... Show MoreThe current research aims to identify the effect of the learning mastery strategy using interactive learning as a therapeutic method on the achievement of secondary school students in mathematics. To achieve the research objective, the researcher selected second-grade middle school students at Al-Haybah Intermediate School for Boys and determined his research sample, which consisted of (77) students distributed into two sections: Section (A) the experimental group, with (38) students, and Section (B) the control group, with (39) students. The statistical equivalence of the two research sample groups was confirmed in the variables (intelligence test, previous achievement, and previous knowledge test). The researchers chose the par
... Show MoreThe study aimed to explore the effectiveness of using rational judgment strategy in teaching science to develop scientific thinking for second-grade students. The researcher utilized the quasi-experimental approach based on (the pre/post designing) of two groups: experimental and control. As for tools: a test of scientific thinking prepared by the researcher that proved its verification of their validity and reliability. The test applied on a random sample of (66) students, divided into two groups: (34) experimental, and (32) control. The results showed that the experimental group outperformed the control group in the post-application of the scientific thinking test, In each skill separately, and in the total skills. The study recommende
... Show MoreBackground: Measuring implant stability is an important issue in predicting treatment success. Dental implant stability is usually measured through resonance frequency analysis (RFA). Osstell® RFA devices can be used with transducers (Smartpeg™) that correspond to the implants used as well as with transducers designed for application with Penguin® RFA devices (Multipeg™). Aims: This study aims to assess the reliability of a MultiPeg™ transducer with an Osstell® device in measuring dental implant stability. Materials and Methods: Sixteen healthy participants who required dental implant treatment were enrolled in this study. Implant stability was measured by using an Osstell® device with two transducers, namely, Smartpeg™ and M
... Show MoreIn this research, silver nanoparticles (AgNPs) were manufactured using aqueous extract of mushroom Pleurotus ostreatus. Anticancer potential of AgNPs was investigated versus human breast cancer cell line (MCF-7). Cytotoxic response was assessed by MTT assay. AgNPs showed inhibition effect at the following concentrations 12.5, 25, 50, 100 and 200 µg/ml versus MCF-7 cell line, and all treatments had a positive result. The MCF-7 cells were inhibited up to 85.14 % at the concentration 200 μg/ml of AgNPs which reduced cells viability to 14.86%, while 12.5 μg/ml of AgNPs caused 24.23% cells inhibition with reduction of cells viability to 75.77%.
This study focused on a fundamental issue which was represented by ability of Iraqi central bank in facing the difficulty of determining the optimal ratio of liquidity in the Iraqi banks in terms of the balancing between its obligations to the depositors and borrowers, and liquidate their funds on one hand and the risks on the other hand.the search aimed for achieving the goals which represented by identifying the possibility of Iraqi banks to apply the regulations rules and instructions issued by central bank of Iraq in determining ratio of liquidity and its appropriate with Iraqi banks action to implement a reasonable profit to&
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More