Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
In this research we prepared shiff bases unilateral claw( benzyl imine aniline ) and Bilateral claw ( benzayal-2-imine phenol ) in high purity reach to 98% , which it's prepared from aromatic amine with aldehydes, it's solid,thermosetting, not dissolved in water in general. Diagnosed prepared article by using infra red spectroscopy (IR) which shows azomethen grop at 1640cm-1 At this diagnosis we suggest tetra headral mechanism in this Circumstances For a reaction.
Aqueous root extract has been used to examine the green production of silver nanoparticles (AgNPs) by reducing the Ag+ ions in a silver nitrate solution. UV-Vis spectroscopy, X-ray diffraction, field emission scanning electron microscopy, and Fourier transform infrared spectroscopy (FTIR) were used to analyze the produced AgNPs. The AgNPs that were created had a maximum absorbance at 416 nm, were spherical in form, polydispersed in nature, and were 685 nm in size.The AgNPs demonstrated antibacterial efficacy against Escherichia coli and Staphylococcus. The dengue vector Aedes aegypti's second instar larvae were very susceptible to the AgNPs' powerful larvicidal action.
Mixed ligand metal complexes of CrIII, FeIII,II, NiII and CuII have been synthesized using 5-chlorosalicylic acid (5-CSA) as a primary ligand and L-Valine (L-Val) as secondary ligand. The metal complexes have been characterized by elemental analysis, electrical conductance, magnetic susceptibility measurements and spectral studies. The electrical conductance studies of the complexes indicate their electrolytic nature. Magnetic susceptibility measurements revealed paramagnetic nature of the all complexes. Bonding
The aim of this work is to produce samples from Iraqi raw materials like Husyniat Bauxite (raw and burnt) and to study the effect of some additives like white Doekhla kaolin clays and alumina on that material properties were using sodium silica as a binding material. Five mixtures were prepared from Bauxite (raw and burnt) and kaolin clays, with an additive of (40) ml from sodium silica and alumina of (2.5, 5, 7.5,10 wt %) percentage as a binding material. the size grading was through sieving. The formation of all specimens was conducted by a measured gradually semi-dry pressing method under a compression force of (10) Tons and humidity ratio ranging from (5-10) % from mixture weight. Drying all specimens was done and then they were burn
... Show MoreCompression study of Irisin, Vitamin D and Kidney Function Parameters Between Iraqi Fracture Patients with and Without DM2 and Healthy Control, Omar Yousif Majnun*, Altaie AF
Abstract: The aim of this study was to identify the Distress Tolerance among the Employees in Media and Communication in Baghdad.and to identify the significance of the differences between sex ,scientific specialization ,age,and marital status. and the researcher used the Distrees Tolerance measure for Simon &Gahar 2005. The sample of the study consisted of(37)Employees.The Scale of Distrees Tolerance were used as the study tools after being checked for their Validity and Reliability. The research results indicated that employees have high scores on the scale of stress tolerance and that there are statistically significant differences between the age groups and between married and unmarried people a
... Show MoreThe image of television dominates the cognitive and artistic motivations. It is the formulation of ideas and visions along with its documentary ability. It is the main element in television work as it is a story that is narrated in pictures. Therefore, attention to image building is a major point of gravity in the work structure as a whole. On the image is the element carrying all aesthetic and expressive values of news and information directly to the hints that work to stimulate and stir the imagination of the recipient to evoke mental images added to the visual images to deepen the meanings.
All visual arts carry elements and components that follow in a particular pattern to give special meanings and specific connotations. However,
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThis research aims to analyze the intellectual and civilizational regression that afflicted Iraqi and Arab society due to political and religious tyranny and internal conflicts, which was reflected in the deterioration of human rights values and the absence of equality and justice in dealing with the other religiously, which affected the reluctance of members of religious groups to interact with their national societies and then migrate to Outside, which contributed to a double loss, in terms of the loss of these societies by productive and effective national competencies, and in terms of distorting the image of Islam. The research stressed that the first treatments of this phenomenon are the consolidation of the values of citize
... Show More