Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
It is not often easy to identify a certain group of words as a lexical bundle, since the same set of words can be, in different situations, recognized as idiom, a collocation, a lexical phrase or a lexical bundle. That is, there are many cases where the overlap among the four types is plausible. Thus, it is important to extract the most identifiable and distinguishable characteristics with which a certain group of words, under certain conditions, can be recognized as a lexical bundle, and this is the task of this paper.
The primary objective of this paper, is to introduce eight types of topologies on a finite digraphs and state the implication between these topologies. Also we used supra open digraphs to introduce a new types for approximation rough digraphs.
This is a research in which I studied the opinions of Arab scholars, in their studies
For (what) and (whatever) the two conditionals and their indication of time, and its name
B (time in (what) and (whatever) the two conditions), and I mentioned their opinions in it
This issue was discussed and discussed, and in this study it relied on the sources of the Arabic language.
Especially the books of grammar, interpretation, and the opinions of the scholars of the principles of jurisprudence are mentioned,
I also mentioned the opinion of the scholars of jurisprudence, and how they likened (whatever) to (everything).
In its indication of repetition, and as long as it indicates repetition, it indicates
time Because repetitio
Gestational Diabetes Mellitus is known as carbohydrate intolerance first detected during pregnancy. Pregnancy is periods of intense hormonal changes. The aim of the present study was to investigate a possible relation between the changes in serum hormones such as Luteinizing hormone (LH) , follicle stimulating hormone(FSH), Progesterone, and Prolactin with gestational diabetes mellitus. Thirty patients with gestational diabetes mellitus aged (22 -40) year attending the national center for treatment and research of diabetes/ AL-Mustansiriya University in Baghdad and 29 controls aged (20-39) year were participated. Hormonal tests including, FSH, LH, Progesterone, and Prolactin were detected by using Enzyme Linked Fluorescent Assay (ELFA) k
... Show MoreAbstract. This study gives a comprehensive analysis of the properties and interactions of fibrewise maximal and minimal topological spaces. Fibrewise topology extends classical topological concepts to structured spaces, providing a thorough understanding of spaces that vary across different dimensions. We study the basic theories, crucial properties, and characterizations of maximal and minimal fibrewise topological spaces. We investigate their role in different mathematical contexts and draw connections with related topological concepts. By providing exact mathematical formulations and comprehensive examples, this abstract advances the fields of topology and mathematical analysis by elucidating the unique properties and implications of fib
... Show MoreI attended some amides non grassy substitutes such as acrylic compounds Amaid Electron Amaid and Alsinamamaid interaction unsaturated acids such as acrylic acid or Ketronk ????????? with primary amines Malkhtlfah of acrylic monomers Alamayd
In this thesis, we introduce eight types of topologies on a finite digraphs and state the implication between these topologies. Also we studied some pawlak's concepts and generalization rough set theory, we introduce a new types for approximation rough digraphs depending on supra open digraphs. In addition, we present two various standpoints to define generalized membership relations, and state the implication between it, to classify the digraphs and help for measure exactness and roughness of digraphs. On the other hand, we define several kinds of fuzzy digraphs. We also introduce a topological space, which is induced by reflexive graph and tolerance graphs, such that the graph may be infinite. Furthermore, we offered some properties of th
... Show MoreThe present study aims at investigating classroom verbal and nonverbal communication at the departments of English language . An observation checklist has been constructed , which is distributed into several domains that include a number of items to investigate classroom communication . Face validity and reliability coefficient have been computed. The checklist has been applied on 86 instructors at the Colleges of Education and Arts, Departments of English Language at the Universities of ThiQar, Basrah ,and Maysan . One sample t- test and Two independent sample t-test formulas have been used. Final results reveal that college instructors use verbal communication inside their classrooms and non- verbal communication has not been employed by
... Show MoreIsthmus life and prepare for it