Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
The effect of air injection device on the performance of airlift pump used for water pumping has been studied numerically and experimentally. An airlift pump of dimensions 42mm diameter and 2200 mm length with conventional and modified air injection device was considered. A modification on conventional injection device (normal air-jacket type) was carried out by changing injection angle from 90 (for conventional) to 22.5 (for modified). Continuity and Navier-Stokes equations in turbulent regime with an appropriate two-phase flow model (VOF) and turbulent model ( ) in two dimensions axisymmetry flow were formulated and solved by using the known package FLUENT version (14.5). The numerical and experimental investiga
... Show MoreA new carbonyl complexes of triazole and oxadiazole were synthesized. These complexes were identified and their structural geometric were suggested by using FT-IR and UV-Vis spectra, conductivity measurements and other chemical and physical properties. The spectra data (FT-IR, UV, Vis.) with the substantial aid of group theoretical calculations gave so many evidences for the proposed geometries and the type of bonding of these compounds
A load flow program is developed using MATLAB and based on the Newton–Raphson method,which shows very fast and efficient rate of convergence as well as computationally the proposed method is very efficient and it requires less computer memory through the use of sparsing method and other methods in programming to accelerate the run speed to be near the real time.
The designed program computes the voltage magnitudes and phase angles at each bus of the network under steady–state operating conditions. It also computes the power flow and power losses for all equipment, including transformers and transmission lines taking into consideration the effects of off–nominal, tap and phase shift transformers, generators, shunt capacitors, sh
Among all the common mechanical transmission elements, gears still playing the most dominant role especially in the heavy duty works offering extraordinary performance under extreme conditions and that the cause behind the extensive researches concentrating on the enhancement of its durability to do its job as well as possible. Contact stress distribution within the teeth domain is considered as one of the most effective parameters characterizing gear life, performance, efficiency, and application so that it has been well sought for formal gear profiles and paid a lot of attention for moderate tooth shapes. The aim of this work is to investigate the effect of pressure angle, speed ratio, and correction factor on the maxi
... Show MoreAbstrct The Turkish political system has undergone exceptional and unprecedented circumstances, represented by a series of security and political unrest that has cast its shadow over the Turkish state and regional and international challenges. It has never been a pretext or pretext for continuing the comprehensive reform process. The constitutional amendments of the 1982 Constitution, Justice and development, whether political, economic or social, is not a reaction to a difficult reality; it is a system of governance and a national option stemming from within. It promotes national unity and enshrines democracy and the concept of public rights and freedoms.
Two new nonsymmetrical mesogenic homologous series of terminal substituent ether (series [Vn]) and carboxy (series [VIn]) incorporating azobenzene and 1,3,4-oxadiazole group were synthesized. Both series have been All compounds thus isolated were purified and characterized by elemental analysis, Fourier Transform Infrared Spectroscopy, 1H NMR, along with thermal analysis and texture observation using Differential Scanning Calorimetry (DSC) and Polarizing Optical Microscopy (POM), respectively. All compounds of the first series exhibited liquid crystalline properties. The homologues [V1]-[V3] display a nematic mesophase, the compounds [V4]-[V7] exhibit a dimorphism behavior, nematic (N) and smectic A (SmA) mesophases, the compounds [V8] and
... Show MoreHuman beings have an innate and natural aim to achieve their self-interests and to show their ability to overcome challenges in a better way, therefore the move towards self determination is expressed by intrinsic motivation. The desire of absorbing in this task is to enjoy the task in it self and benefitting from it such a motivation is the desire rooted in human nature to judge and choose in which individual is conscious in his self, abilities and adequacy that help him in control the different situations of life passed by him. His choices and actions are voluntary and non-restricted to intervention or external control because control is inner and subjective, while his behavior is self-regulated with the feeling of
... Show More