Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Thisstudy aims to determine the specifications of obese women accordingto the heightand type of obesity. It also aimstoidentify the significance of differences in choosing ready-made clothes for the research sample. Finally, the significance of differences in choosing ready-made clothes according to the variable of binaryclassification ofobesity is also identified.The study sample includes obese women: employees, non-employees and students with the age group (18-50) years.The weights and lengths of the sample have been taken to suit the group of obese women.Aquestionnaire in the form of an open question was distributed among (50) obese womenso as to extract the items of the questionnaire. After that, the questionnaire was distributed amo
... Show MoreEruca sativa (jarjeer) is an annual herb (family Brassicaceae), which contains a wide range of chemicals and minerals with nutraceutical and organoleptic characteristics. Jarjeer was generally used as a food and traditionally mainly consumed due to its aphrodisiac properties. This crop known to contain various phytochemicals such as flavonoids, phenolic acids, terpens, carotenoids, tannins, glycosides, saponins, sterols, alkaloids, and other secondary metabolites. In leaves, kaempferol and its derivatives, glucosativin, are the main flavonoids and glucosinolate, respectively, while erucic acid and glucoerucin are the main fatty acid and glucosinolate, respectively. Medicinally, the plant has antibacterial, antidiabetic, antihyperten
... Show MoreAntacids have been widely used in the treatment of various gastric and duodenal disorders such as heartburn, reflux esophagitis, gastritis, irritable stomach, gastric and duodenal ulcers. A pH-responsive of bi-polymer of sodium alginate and pectin have been studied as raft-forming polymers using sodium bicarbonate and calcium carbonate as gas-generating and calcium ion sources. The aim of study was to formulate and evaluate mono and bilayer tablets of floating and sustained release antacid delivery systems using sodium carboxy methyl cellulose as a gel forming substance, calcium and magnesium carbonate as sources of acid neutralizing and carbon dioxide gas generators agents upon contact with acidic solution. The effect of the formulation
... Show MoreIn this study we examine variations in the structure of perovskite compounds of LaBa2Cu2O9, LaBa2CaCu3O12 and LaBa2Ca2Cu5O15 synthesized using the solid state reaction method. The samples’ compositions were assessed using X-ray fluorescence (XRF) analysis. The La: Ba: Ca: Cu ratios for samples LaBa2Cu2O9, LaBa2CaCu3O12 and LaBa2Ca2Cu5O15 were found by XRF analysis to be around 1:2:0:2, 1:2:1:3, and 1:2:2:5, respectively. The samples’ well-known structures were then analyzed using X-ray diffraction. The three samples largely consist of phases 1202, 1213, and 1225, with a trace quantity of an unknown secondary phase, based on the intensities and locations of the diffraction peaks. According to the measured parameters a, b, and c, every sa
... Show MoreThe alluvial fan of Mandali located between latitude 30˚45’00” N longitude 45˚30’00” E in east of Diyala Governorate, Iraq. Thirty-five wells were identified in the study area with average depth of 84 m and estimated area of 21550 ha. A three-dimensional conceptual model was prepared by using GMS program. From wells cross sections, four geological layers have been identified. The hydraulic conductivity of these layers was calculated for steady state condition, where the water levels for nine wells distributed over the study area were observed at same time. Afterward, PEST facility in the GMS was used to estimate the aquifer hydraulic characteristics. Other characteristics such as storage coefficient and specific yield have
... Show MoreConcert place high school in the community Keep pace with societal change and what is going through Iraqi society from the wars and occupation and the sectarian and ethnic conflict and authoritarian policies and Dictator ship .
This is the circumstance of the most important historical stages that require .
Precision sons is Keep up with the progress and development and the advancement of the educational march .
The school is a social institution that organizes the members of society all walks of life and their habitats working on crafting members of the extraordinary alve of progress At the multiplicity of functions and tasks school pequires members qualified scientific and practical Becomes complementary members seek progress a
The present study aims at identifying the styles, procedures of Iraqi universities to avoid plagiarism and evaluate these steps, also to evaluate the form prepared by the Directory of Scientific Supervision and Evaluation, Ministry of Higher Education and Scientific Research. The study uses documentary style, 150 teachers in the following colleges (Education Ibn Rushd, Languages and Arts) in university of Baghdad whom already used the aforementioned list were the sample of the study and they asked to give their opinions about the list.The study consists of five sections, first one deals with general view, second explains plagiarism and its types, shapes and reasons,third tackles with ways of detecting plagiarism, its programs, consequences
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, WM Katof, THE IRAQI POSTGRADUATE MEDICAL JOURNAL, 2013 - Cited by 6
In any language there is some amount of difference between written language (planned) and spoken language (spontaneous). Since planned speech could be considered a form of written language, it could be inferred that there are also differences between planned speech and spontaneous speech. Some of these differences are very clear in terms of syntax, lexis, phonology and discourse. These differences are highlighted in order to make a clear distinction between spontaneous and planned speech.
This paper is an attempt to show the differences between the two forms of a language (written & spoken English) as far as number of linguistic features are tackle
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show More