Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Technology developed at very rapid paces in the last decade of the twentieth century and what followed, especially communication technology, as the World Wide Web appeared in the mid-nineties of the last century, Facebook in 2004 and 2006, the mobile phone, 1993, 1994, and social networking sites. The other. These technological developments have had an impact on societies, whether among individuals in one country or among different peoples. The citizen in any part of the world has become a journalist who practices the work of a specialized or professional journalist, even if he does not know how to read and write, or has a low level of education, as he can now transmit events from wherever he is to the world, through his personal page, or v
... Show MoreIn his study, the researcher highlighted the most important methods of authorship in the fundamentals of jurisprudence and speech. Fundamentalist rules and extraction and access method; they also distinct from each other that each has special divisions of the subjects of jurisprudence.
A simple analytical method was used in the present work for the simultaneous quantification of Ciprofloxacin and Isoniazid in pharmaceutical preparations. UV-Visible spectrophotometry has been applied to quantify these compounds in pure and mixture solutions using the first-order derivative method. The method depends on the first derivative spectrophotometry using zero-cross, peak to baseline, peak to peak and peak area measurements. Good linearity was shown in the concentration range of 2 to 24 μg∙mL-1 for Ciprofloxacin and 2 to 22 μg∙mL-1 for Isoniazid in the mixture, and the correlation coefficients were 0.9990 and 0.9989 respectively using peak area mode. The limits of detection (LOD) and limits of quantification (LOQ) wer
... Show MoreThe new compounds synthesized by sequence reactions starting from a reaction of 4-hydroxybenzaldehyde with 1,5-dibromo pentane to produce dialdehyde)I( .Then compound )I( reacted with different aromatic amines to give schiff bases )IIIV(,thereafter added acetyl chloride to schiff bases to yield N-acyl derivatives)VVII(.While1,3-diazetine derivatives)VIII-X( were synthesized from the reaction of N-acyl derivatives with sodium azide.The reaction of thiourea with N-acyl compounds led to formation of thiourea derivatives (XI-XIII).Finally, the pyrimidine compounds )XIV-XVI( were synthesized by ring closure reaction of compounds(XIXIII) with diethyl malonate.The synthesized compounds were characterized by measurements of melting points,FTIR,1H-N
... Show MoreMammary tumors (CMT) in dogs in Iraq may be induced by carcinogenic war ordnance. In our study, 10 virgin un- spayed military/pet bitches aged 5-15 years presented with abnormal masses in the abdomen with painful oedema, swelling, anorexia, weight loss, weakness and mild fever. Examination of regional lymph nodes and thoracic radiography confirmed metastasis. Tumors were excised and determined to be mostly adenocarcinomas involving multiple glands, solid in texture, 5-15 cm in size, mostly in the inguinal mammary glands at stage T3: >5 cm. Microscopy confirmed presence of adenocarcinoma in 8 dogs and solid carcinoma in 2 with half of tumors being grade III. Tumors had pleomorphic hyperchromatic cell nuclei in stroma, epithelial cells of duc
... Show Moreالذات والتحصيل الدراسي . وقد استخدمت الباحثة المنهج الوصفي التحليلي، وبلغت عينة الدراسة (500) طالبًا وطالبة، تم اختيارهم بالطريقة الطبقية العشوائية وهي تمثل (15%) من مجتمع الدراسة البالغ (3328) طالباً وطالبة من طلبة المرحلة الإعدادية واستخدمت الباحثة مقياسين تم بناء مقياس لقياس الجوهر والمظهر وتبني مقياس فاعلية الذات بعد إن قامت بترجمته وتعريبه وجعله ملائم للبيئة العراقية، كم تم استخراج درجات التحصيل الدراسي للع
... Show MoreRheumatoid arthritis and periodontitis use analogous effector destructive procedures, in that the inflammatory cells and pro-inflammatory cytokines that drive chronic bone erosion in RA and chronic periodontal destruction in Periodontitis are alike. Periodontitis (PD) has appeared as a hazard factor in a number of health situations as rheumatoid arthritis (RA). To determine the effect of anti-tumor necrosis factor alpha biological treatment (methotrexate and Enbrel or infliximab) on periodontal status of patients having rheumatoid arthritis with periodontitis in comparison to those having periodontitis without rheumatoid arthritis and control healthy subjects and to determine the serum levels of anti-cyclic citrullinated peptide (ACCP) in t
... Show MorePrison and imprisonment
And their impact on the strengthening of power
In the Qur'anic perspective