Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Vocational stresses and their relation with the level of ambition among the lecturers of the university In general , vocational stresses affect the attention and the process of focusing making individual busy with solving of his daily problems instead of his job. The vocational stresses , anxiety and tension are factors effecting the physical and psychological ability of the individual. This study aims to measure the vocational stresses among the lecturers of the university , to measure the level of ambition among them, to identify the statistical differences significant among them according to sex variable, to identify the differences significant in level of ambition among them according to sex variable and to identify the correlation r
... Show MoreRecommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o
... Show MoreThis research aims to study a range of yet and future variables that can affect human resources in Iraq and public organizations that influence the size of each, and the extent of its contribution to the development of human resources through the National Investment Commission of Baghdad. The identified research problem in a set of questions was the most important, what are the variables that help in the development of human resources to the Investment Commission of Baghdad theme of the search, in order to achieve the goal of research and answer questions about the problem, applied research on both the research community's (55) individual executives and employees.
Researcher has identified a r
... Show MoreMottos Of Opposition Movements In iraq during the umayyad period and their religious and political indications - al shia and al khawarij
Abstract
Backgrounds: Jaundice occurs in most newborn due to increased bilirubin concentration. Jaundice is observed during the first week after birth in approximately 60% of term neonates. A high level of bilirubin is neurotoxic and may cause neonatal kernicterus, auditory neuropathy or death.
Objectives: to compare the Rh group compatibility, serum bilirubin (total and direct), serum albumin and several liver enzymes between physiological and pathological neonatal jaundice
Materials and Methods: A cross sectional study for one hundred neonates with jaundice divided into group 1: 50 newborns with physiological jaundice, Group 2: 50 newborns with
... Show MoreThe research aims to evaluate Islamic electronic libraries and their service for downloading research and illustrated books, explaining their origins, features and types. The research was limited to the libraries available on the Internet that provide the service for downloading research and illustrated books. The researcher relied on the survey approach to identify the libraries and a sample of them (20 libraries) was selected. For the purpose of evaluating it according to five criteria related to the preparation and publication of Islamic electronic libraries (the responsible party, the goals and objectives, the year, the services it provides, the sections and subject specializations of its contents) and five criteria related to the servi
... Show MoreGlobalization has occupied a great deal of studies, research and literature, in addition to being a phenomenon that has imposed itself firmly on the ground. Globalization is considered the main feature of the current moment in today's world. The world is now transforming in an unprecedented way under noticeable titles of successive waves of knowledge and technology.The current research aims to identify the effects of globalization on the variables and their political, social, media and cultural dimensions, as well as culture of consumption and cultural identity.The theoretical framework included two sections: the first is the concept of globalization, its history and its dimensions, and the second is the modernity in contemporary Europea
... Show MoreA new synthesis of Schiff (K) 6 and Mannich bases (Q) 7 had formed compound (Q) 7 by reacting compound (K) with N-methylaniline at the presence of formalin 35% to given Mannich base (Q). Additionally, new complexes were formed by reacting Schiff base (K) with metal salts CuCl2·2H2O, PdCl2·2H2O, and PtCl6·6H2O by 2:1 of M:L ratio. New ligands and their complexes were characterized, exanimated, and confirmed through several techniques, including FTIR, UV-visible, 1H-NMR, 13C-NMR spectroscopy, CHN analysis, FAA, TG, molar conductivity, and magnetic susceptibility. These compounds and their complexes were screened against breast cancer cells. It was determined that several of these compounds had a significant anti-breast cancer effec
... Show MoreComplex-valued regular functions that are normalized in the open unit disk are vastly studied. The current study introduces a new fractional integrodifferential (non-linear) operator. Based on the pre-Schwarzian derivative, certain appropriate stipulations on the parameters included in this con-structed operator to be univalent and bounded are investigated and determined.