Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Blind Color Image Steganography in Spatial Domain
...Show More Authors

WA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.

View Publication
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Standards and quality controls for information technology applications to serve the Holy Quran
...Show More Authors

the research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.

To achieve this goal, the researcher has built a list of criteria according to the following steps:

First - identify the key areas covered by the whole list which are:

1 – Standards of system building and implementing with the operating screens.

2 – Standards of display forms including audio and video presentation.

3 – Standards which are related to the program philosophy.

4 - Standards which are related to the program objectives.

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s

... Show More
Publication Date
Sun May 22 2022
Journal Name
International Journal Of Early Childhood Special Education (int-jecs)
The image of Al-Shuhada'a Establishment among the families of martyrs, victims of terrorism, war operations and military mistakes
...Show More Authors

This research (The families of martyrs, victims of terrorism, war operations and military mistakes opinion about Al- Shuhada`a Establishment ) came to know and diagnose the mental image the martyrs victims of terrorism carries about the performance of Al- Shuhada`a Establishment and the services it provides to them, and to monitor the contents of that image that they had regarding their privileges and rights that Al- Shuhada`a Establishment supposed to give it to them, according to their law. The research problem was represented by the main question: (What is the image of Al- Shuhada`a Establishment among the families of martyrs, victims of terrorism, war operations and military mistakes), and this research was classified within the d

... Show More
Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Selling the sample in Islamic law and its contemporary applications
...Show More Authors

Praise be to God, who taught with the pen, taught man what he did not know, and may blessings and peace be upon our master Muhammad, may God bless him and grant him peace, and upon all his family and companions.
As for after......
The science of financial transactions is one of the important topics that Muslims must need at all times and places, due to its great importance in clarifying the ruling of the Shari’ah on contemporary financial issues.
The jurists, may God have mercy on them, have spoken about financial issues in all their aspects in detail, as in the Book of Sales, whether in terms of the validity of the sale, its invalidity, or its invalidity, i.e., the invalidity of the sale. Among these issues is the issue of th

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 10 2015
Journal Name
British Journal Of Applied Science & Technology
The Use of Cubic Bezier Interpolation, Biorthogonal Wavelet and Quadtree Coding to Compress Color Images
...Show More Authors

In this paper, an efficient method for compressing color image is presented. It allows progressive transmission and zooming of the image without need to extra storage. The proposed method is going to be accomplished using cubic Bezier surface (CBI) representation on wide area of images in order to prune the image component that shows large scale variation. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, bi-orthogonal wavelet transform is applied to decompose the residue component. Both scalar quantization and quad tree coding steps are applied on the produced wavelet sub bands. Finally, adaptive shift coding is applied to handle the remaining statistical redundancy and attain e

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Checking the Accuracy of Selected Formulae for both Clear Water and Live Bed Bridge Scour
...Show More Authors

Due to severe scouring, many bridges failed worldwide. Therefore, the safety of the existing bridge (after contrition) mainly depends on the continuous monitoring of local scour at the substructure. However, the bridge's safety before construction mainly depends on the consideration of local scour estimation at the bridge substructure. Estimating the local scour at the bridge piers is usually done using the available formulae. Almost all the formulae used in estimating local scour at the bridge piers were derived from laboratory data. It is essential to test the performance of proposed local scour formulae using field data. In this study, the performance of selected bridge scours estimation formulae was validated and sta

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Apr 21 2022
Journal Name
Journal Of Ecological Engineering
Simultaneous Adsorption of Ternary Antibiotics (Levofloxacin, Meropenem, and Tetracycline) by SunFlower Husk Coated with Copper Oxide Nanoparticles
...Show More Authors

In this study, a new adsorbent derived from sunflower husk powder and coated in CuO nanoparticles (CSFH) was investigated to evaluate the simultaneous adsorption of Levofloxacin (LEV), Meropenem (MER), and Tetracycline (TEC) from an aqueous solution. Significant improvements in the adsorption capacity of the sunflower husk were identified after the powder particles had been coated in CuO nanoparticles. Kinetic data were correlated using a pseudo-second-order model, and was successful for the three antibiotics. Moreover, high compatibility was identified between the LEV, MER, and TEC, isotherm data, and the Langmuir model, which produced a better fit to suit the isotherm curves. In addition, the spontaneous and exothermic nature of the adsor

... Show More
Scopus (32)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Isolate and diagnose some bacteria contaminated minced meat and determine the concentrations of powder and extracts plant cinnamon bark inhibitory and minimum lethal bacteria
...Show More Authors

Powder extracts hot water from local ground beef and studied inhibitory effectiveness of powder and extracts to the concentration of the aqueous extract hot Gulf students

View Publication Preview PDF