Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Technology is an important factor for achieving architecture as an impact and vulnerability. It represents one of the significant elements in creating the intellectual framework, as well as having its own intellectual breakdown, while values constitute the most important and obviously factor of the community's intellectual. Research aims was determined accordingly by: investigating the role and impact of values and their relationship to technology in architecture.
In this context, the research investigated values and technology in architecture, through discussing their aspects and dimensions in architecture. In the context of values, the research discussed their concept and the related ones to have a concrete def
... Show MoreThe study area is witnessing divergence where I am North wind North East wind as we find that the north wind is getting replicated as we move from the south, The reason can be attributed to the nature of the surface of the region, with at least repeat this wind the northern region to the presence of mountain ranges, while we find that energizes the surface in the center and south helped to increase repeat this wind gusts, It also finds that the North wind East prevail in the northern region and least replicated as we move from the north to the south and to the fact that North stations are within blowing this wind sites for the circles near the display of high pressure located centers to the north-east, north and distancing itself from pa
... Show MoreObjective: Schiff’s and Mannich bases of isatins are an important group of heterocyclic compounds which are of great importance in medicinal chemistry as antimicrobial agents. In the vision of these facts, new bis-Schiff bases and Mannich bases of isatins were synthesized. Methods: Three different bis-Schiff bases (3a-c) have been synthesized by reacting isatin, 5-fluoroisatin and 5-methoxy isatin with thiophene-2- carboxaldehyde using hydrazine hydrate to link between the carbonyl compounds, and then these bis- Schiff bases were condensed with two different secondary amines (piperidine and morpholine) separately, and formaldehyde to form the Mannich bases (4a-c and 5a-f), respectively. Results: The structures of the newly synthesized com
... Show MoreIn this study Oscillatoria limnetica and Chroococus minor were isolated ?purified and identification from water canal around Baghdad University Campus. The water of this canals originally from Tigris River. BG-11 culture media was used for their cultivation in suitable laboratory conditions (25c°, 200µE/m2/sec) for 16:8 hrs. Light: dark. Each culture was harvested at the end of exponential phase .Organic solvents used for extraction were Ethanol? Hexane and Methanol 95% to extract the crude active Intracellular and Extracellular substances, and evaporated down to dryness .Antibacterial and antifungal activity of these different extracts were evaluated against 6 strains of gram positive bacteria and gram negative bacteria in additi
... Show MoreConstitutional Review of 1992 and 1996 and the role of the Party of Progress and Socialism
This experiment was conducted in the season 2001-2000 in station Ishaqi the company's general industrial crops to plant livestock Vigna radala deleted (Khadrawi) carried out the experiment design panels splinter and order in RCBD with three balls two factors are levels nitrogen fertilizer (120 and, 100.0 kg urea / ha)nitrogen ratio of 46%, which put in the main panels mAIN PLOT and Alkiavat three levels that were placed in secondary panels .....
Background: With the start of the current century, increased the interest in the role of the adipose tissue derived substances that named adipokines in the inflammatory diseases of the human being including the inflammatory periodontal disease, but scientific evidences were not clearly demonstrate the association between these adipokines and periodontal pathologies. Materials and Methods: Forty two subjects male only with normal body mass index were selected for the study with an age ranged (30-39 years). Samples were divided into three groups of 14 subjects in each group based on clinical periodontal parameters; clinically healthy gingiva (group I), gingivitis group (group II) and chronic periodontitis patients group (group III), from whom
... Show MoreThis study included isolation of some active materials from Curcuma longa such as tannins, saponins and volatile oils with percentage of 59%, 31%, and 9% respectively. Also the study included the determination of minerals in Curcuma longa such as " Na, Ca and K" using Flame photometer. The concentrations of these minerals were (14 ppm),(10 ppm) and )76 ppm) respectively. The anti-bacterial activity study was performed for the active materials isolated from Curcuma longa against two genus of pathogenic bacteria, Escherichia Coli and Staphylococcus aurous by using agar-well diffusion method. It appeared from this study that all of the extraction have inhibitory effect on bacteria was used. The inhibition zone diameter varies with
... Show More