Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 21 2022
Journal Name
Journal Of Planner And Development
The Role of Information Technologies in the Management and Sustainability of Land Use in Future Cities
...Show More Authors

The most important contemporary issues which related to the survey of the influence of communication development technology to land use sustainability. The research aims to explain the changes that happened in the quality & land use activities performance by understanding the transformations due to modern technology and its impact on current uses and its impact on changing functional relationships between those uses to create new combinations or hybrid uses.Research will follow the analytical descriptive approach in presenting the problem of research. Research has several conclusions & recommendations, one of conclusions is the change of the place concept and its relation to changing the concept of land use and its sustai

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Modern Sport
Vertical Resistance and Its Relationship with Speed-Strength and Biomechanical Variables During the Takeoff Phase and the Performance of Selected Activities in Individual and Team Sports
...Show More Authors

Jumping ability is a fundamental variable in many sports, as its execution requires an integration of muscular strength Q1 and certain biomechanical variables. This is particularly evident in gymnastics jumping events and jump shots in ball games, both of which rely on a high level of vertical resistance. Vertical resistance serves as an indicator of an athlete’s ability to overcome their body weight while counteracting gravitational force to achieve optimal performance. As such, it is considered one of the key factors in movements that demand explosive power and speed. The researchers believe that despite the significant relationship between vertical resistance, speed-strength of the arms and legs, and certain biomechanical varia

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Health Science Reports
Diagnostic potential of salivary interleukin‐17, RANKL, and OPG to differentiate between periodontal health and disease and discriminate stable and unstable periodontitis: A case‐control study
...Show More Authors
Abstract<sec><title>Background and Aims

Limitations of the conventional diagnostic techniques urged researchers to seek novel methods to predict, diagnose, and monitor periodontal disease. Use of the biomarkers available in oral fluids could be a revolutionary surrogate for the manual probing/diagnostic radiograph. Several salivary biomarkers have the potential to accurately discriminate periodontal health and disease. This study aimed to determine the diagnostic sensitivity and specificity of salivary interleukin (IL)‐17, receptor activator of nuclear factor‐κB ligand (RANKL), osteoprotegerin (OPG), RANKL/OPG for differentiating (1) periodontal health from disease and (2) stable a

... Show More
View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The art of patchwork in designing and making night gowns and their supplements: The art of patchwork in designing and making night gowns and their supplements
...Show More Authors

Abstract:
If we neglect the value of historical fashions as a source of inspiration for
contemporary fashion designers we will neglect a treasure of original designs.
In neglecting such a treasure how could we then know what is original. Today
the most famous fashion designers are often inspired, in the outwardly from
and internal lines of their fashions, by fashion designed during the ages of the
past.
Designers can find such fashions in books of history and museums. But
the historical ages are not equal in the fertility of the originality and novelty of
their fashions. Thus the contemporary designer may not find the old designs
inspiring so he invents them.
The researcher was keen in this paper to inclu

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Unipolarity and Its Influences in American Foreign Policy and the Future International Relations: Unipolarity and Its Influences in American Foreign Policy and the Future International Relations
...Show More Authors

Abstract
The concept of unipolar has allowed the united states of America to
control the rest of the internations community units through the rxclusively of
control in international affairs without enabling other countries who have the
ability to compete with it to appear this comes as a result of it's position to all
kinds of powers like military, economic and technical powers that enable it to
continue dominating other countries, this superior control enabled it to be the
(hyper power) on the international political scene so that it allowed it to
exercise and implement the policy of domination against all this appeared
after its empire superiority became clear, in a unique way that have never
been known in

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Empowerment and its impact in technical innovation Administrative An analytical study In General Company for electrical Industries
...Show More Authors

based search on two variables two main (Administrative empowerment ) and (technical innovation) target detection relationship and influence between the five dimensions (the delegation of authority , personnel training , effective communication, work teams , motivating employees) and
(technical innovation) conducted research in General Company for electrical Industries , and through the sample included the views of managers in the various administrative levels poll
.

And adopted a researcher at a major tool for data collection is questionnaire designed to find, as was the contents of the questionnaire analysis according to the Statistical Information System ( Spss), The (55) to identi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
synthesis and characterization
...Show More Authors

chloride or poluacrulic acid with different primary amines to mesuring==================================638one hundred three patinents with rheumatic symptoms were include in this study and their sera tested for

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Hawiyyah Journal
Translation and Paratext
...Show More Authors

Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
Semiotics and Communication
...Show More Authors

Verbal Communication is linked with the social event no matter how different Communities in their cultures and styles of living and it's intuitions and political systems remain involved in its need . It is a dialogue , a pillar of human Communication , all Communication process conditional on the where a bouts of the shrine and the cycle of words . Semiotics is based on two principles important to Communicate : one : offer intended to report to the speaker . And the other : The recipient of the message a (know led gment of this intent . And learn to measure intent rely on two types of units ; first is the evidence for which is available for reporting the intent and the other : Signals . semiotics Communicate evidence bother as a channel

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Violence and Islam
...Show More Authors

Most of the texts of Islamic law provide for the payment of damage and the denial of the human ... Damage of all kinds of material and moral, which is in the harm that affects the human being in himself or his offer or money or other affairs respected by Sharia. A person can defend himself, his mind, his religion, his offer and his money (the five imperatives) as much as he can. Islam rejects violence directed without a legitimate right and does not endorse aggression against others. Violence has been defined in language as a lack of compassion or against it or is a reprimand, bashing, and the blame ... It is in psychology: human behavior tainted by cruelty, oppression, and aggression, and is defined politically: it is deliberate civil d

... Show More
View Publication Preview PDF