Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Quality and cost characteristics of tourist
...Show More Authors

The tourism services provided in the hotel organizations are a set of material and moral elements that represent tourist attractions that are offered to the guests in order to satisfy their needs and desires are accommodation, food, drink and other facilities to reach the satisfaction and satisfaction of guests.Where these tourist services need a mechanism to ensure their quality by working to identify and calculate the costs of these services properly and accurately with the attempt to referendum and reduce the waste and loss to reduce these costs while providing the finest types of tourism services by calculating the cost of production and the administration seeks to reduce Non-essential activities through hotel activities that add val

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
synthesis and characterization of 2 hydroxy
...Show More Authors

diasotiation compondnds sulphate upon with melting elemental aryl been used in his mouth for a while of studied

View Publication Preview PDF
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
Structuralism and the Problem of Text
...Show More Authors

All modern critical approaches attempt to cover the meanings and overtones of the text, claiming that they are better than others in the analysis and attainment of the intended meanings of the text. The structural approach claims to be able to do so more than any other modern critical approach, as it claimed that it is possible to separate what is read from the reader, on the presumed belief that it is possible to read the text with a zero-memory. However, the studies in criticism of criticism state that each of these approaches is successful in dealing with the text in one or more aspects while failing in one or more aspects. Consequently, the criticism whether the approach possesses the text, or that the text rejects this possession, r

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 17 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Management of facial fistulas and sinuses
...Show More Authors

Background: A major difference between the treatment of the skin lesions and the odontogenic and non-odontogenic sinuses. We aimed to analyze a substantial number of consecutive causes in order to clinical suspicion in the differential diagnoses may be correctly weighted. Materials and methods: The material of this research consisted of 40 patients. A complete history is collected from the patients with the duration and the site of the sinus present, the patient was examined for factors of the fistulas and sinuses and its associations, and patient having any concomitant lesions, a medical consultation done for opinion and management. Clinical examination with facial fistulas and sinuses was mandatory to avoid any mistakes that may occur. A

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Feb 17 2026
Journal Name
Magazine Aldhakwat Albedh
Imam Hussain and the Great Conspiracy
...Show More Authors

View Publication
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Rooting Governance and its Legal Nature
...Show More Authors

Tax governance is a set of legal means that directs the tax administration to deal in good faith with taxpayers based on transparency, integrity and accountability while ensuring the achievement of tax justice and works to introduce advanced means by which it deals with all stakeholders.

      In this study, we try to explain its rooting and legal nature by shedding light on the position of some international organizations and their internal legislation in the context of public finance.

View Publication Preview PDF
Publication Date
Thu Jan 24 2019
Journal Name
Multifaceted Protocol In Biotechnology
Culturing and Maintaining Mammalian Cell Culture
...Show More Authors

Mammalian cell culture refers to culturing mammalian cells in a medium that provide nutrients for cells to be able to grow in vitro under environment that closely mimic the in vivo conditions. By enabling culturing these cells outside living biological entities, investigation on intra- and intercellular activities and flux; genetic and phenotyping analysis; proteomics, study of toxicology, drug discovery and development can be carried out without manipulation of living animals. In this chapter, detail protocol of media preparation, cell culture maintenance and preservation are elaborated for both types of mammalian cell culture, monolayer or suspension cultures. Determination of number of cells is discussed as well.

Scopus
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
St-Polyform Modules and Related Concepts
...Show More Authors

In this paper, we introduce a new concept named St-polyform modules, and show that the class of St-polyform modules is contained properly in the well-known classes; polyform, strongly essentially quasi-Dedekind and ?-nonsingular modules. Various properties of such modules are obtained. Another characterization of St-polyform module is given. An existence of St-polyform submodules in certain class of modules is considered. The relationships of St-polyform with some related concepts are investigated. Furthermore, we introduce other new classes which are; St-semisimple and ?-non St-singular modules, and we verify that the class of St-polyform modules lies between them.

View Publication Preview PDF
Scopus (8)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of Collage Of Education
FILTER BASES AND ω-PERFECT FUNCTIONS
...Show More Authors

In this paper introduce some generalizations of some definitions which are, closure converge to a point, closure directed toward a set, almost ω-converges to a set, almost condensation point, a set ωH-closed relative, ω-continuous functions, weakly ω-continuous functions, ω-compact functions, ω-rigid a set, almost ω-closed functions and ω-perfect functions with several results concerning them.

Preview PDF