Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Work pressure of the administrative and academic members of Biskra University, its sources and its relation to some personal and functional variables
...Show More Authors

  The study aimed to highlight the reality of the functional pressures with its dimensions (role ambiguity, role conflict, role burden, glass ceiling, and discrimination in composition). The researchers also relied on the questionnaire as a essential tool for data collection. The field study was conducted at the University of Mohammed Khiedr - Biskra -, the study was conducted on the basis of the total survey, which included all the workers of the 6 faculties of Biskra University (523 female employees).

     After the analyzing of the data using the version 21 of the statistical program Spss, The study reached a number of results, the most of them is the low level of the functiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Role Of Information Technology In Enhancing Performance Evaluation And Responsibility Accounting (Empirical Study In Jordan Hotels )
...Show More Authors

   This paper suggesting a new modern method to evaluate the performance of hotel industry at Jordan instead of the classical method used by the industry and that is Bench Marking , this method can be done by comparing the performance of hotel industry at two serial years which helps in calculating a standard performance .

  The industry can use this standard to identify the variance, which make the evaluation of performance easier and support the efforts to develop the hotel industry at all levels and enable to give high quality services to customers.

    The study believed that this situation would not be achieved unless the hotel industry will app

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
information and communication technologies and their impact on changed the financial reporting system In a Sample in Iraqi banks
...Show More Authors

paid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
Media and democracy between propaganda and incitement
...Show More Authors

First: The entrance to media and democracy
The growth of the media and the development of its technologies are linked to the development of the democratic system and its political and mass institutions. In many cases, the technologies concerned were able to open the closed doors to the spread of democracy and broaden the base of its applications. As Dupre points out, “audio-visual has opened the image and sound after printing has opened the natural language” (1) to democratization. The generalization of the book, due to the development of printing, led to the transcendence of the Church's dominance in Europe, and the direct broadcasting and transmission of information enabled the media to transcend the domination of factional syst

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of The College Of Languages (jcl)
Language and Difference: Heidegger, Saussure, and Derrida
...Show More Authors

Although the concept of difference is as old as the foundational concept of similarity, the modern (and contemporary) understanding of difference as a working notion that not only differentiates, but also approximates conflicting elements in an all encompassing system owes a great deal to the German philosopher Georg Wilhelm Friedrich Hegel (1770-1831). An idealist to the backbone, Hegel bequeathed to modern philosophy the postulation that the identity of an individual rests not in itself but in the relationship that individual‟s identity entertains with other members of society. In his classic Phenomenology of Spirit, Hegel explains how humans come to consciousness (pivotal concept in Idealism) through a strenuous, albeit apparently i

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Iranian Journal Of Ichthyology
Adsorption of Phosphorous and Zinc, and their interaction and processing power on Bentonite
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Alglul in Rashidi age and the Umayyad and Abbasid and ordinances "historical study"
...Show More Authors

1-Alglul is the introduction of after prize or (Booty) secretly before it is divided, and the general sense is an absolute betrayal, and God has forbidden and the Prophet (Peace be upon him) by Muslims; such as bribery and gift-giving and other function by the terminology.
2-The signals and texts Alglul in the Covenant Rashidi and the Umayyad and Abbasid very few, compared to the Covenant of the Prophet, and so by the Quranic verses that were deprived Alglul and other Transmitting booty for the Muslims, and the hadith which magnified Alglul and showed its consequences in this life and the afterlife, and the tutelage of the Prophet (Peace be upon him) its active role in reducing Alglul, it was the great commandments included notificati

... Show More
View Publication Preview PDF
Publication Date
Thu May 08 2025
Journal Name
Journal Of Interdisciplinary Mathematics
Fibrewise minimal and maximal regular spaces and Fibrewise minimal and maximal normal spaces
...Show More Authors

The aim of this paper is to introduce and study some of the Fibrewise minimal regular,Fibrewise maximal regular, Fibrewise minimal completely regular, Fibrewise maximal completely regular, Fibrewise minimal normal, Fibrewise maximal normal, Fibrewise minimal functionally normal, and Fibrewise maximal functionally normal. This is done by providing some definitions of the concepts and examples related to them, as well as discussing some properties and mentioning some explanatory diagrams for those concepts.

View Publication
Scopus Clarivate Crossref
Publication Date
Wed May 01 2024
Journal Name
научный форум
jargon and slang: similarities and differences and their role in the Russian language
...Show More Authors