Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
New Schiff-base ligands bearing tetrazole moiety and their polymeric metal complexes with Co(II), Ni(II) and Cd(II) ions are reported. Ligands were prepared in a multiple-step reaction. The reaction of sodium 2,6- diformylphenolate and cyclohexane-1,3-dione with 5-amino-2-fluorobenzonitrile resulted in the isolation of two precursors sodium 2,6-bis((E)-(3-cyano-4-fluorophenylimino)methyl)-4-methylphenolate 1 and 5,5'- (1E,1'E)-cyclohexane-1,3-diylidenebis- (azan-1-yl-1-ylidene)bis(2-fluorobenzonitrile) 2, respectively. The reaction of precursors with azide gave the required ligands; sodium 2,6-bis((E)-(4-fluoro-3-(1H-tetrazol-5- yl)phenylimino)methyl)-4-methylphenolate (NaL) and (N,N'E,N,N'E)-N,N'-(cyclohexane-1,3-diylidene)bis(4- fluoro-3-
... Show MoreThe problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which
... Show MoreBiodegradation is utilizing microorganisms to degrade materials into products that are safe for the
environment, such as carbon dioxide, water, and biomass. The current study aims to isolate and characterize
bacteria with polyethylene terephthalate (PET) degradation ability isolated from Shatt al-Arab water and
sewage from Basra, the bacteria were identified as Klebsiella pneumonia. According to the findings, the
isolates showed a highly significant difference in degradation of PET (24% during 7 days) and the percent of
degradation increased to 46% at 4 weeks compared to the control. The study also involved determining the
optimum temperature of K. pneumonia growth, which was 37°C, while the preferred
Objective The aim of this study was to assess whether serum cytokine levels correlate with clinical periodontal parameters in health or disease.
Materials and Methods Male subjects (40–60 years) with CP (n = 30), CP + CHD (n = 30), and healthy controls (n = 20) had plaque index (PLI), gingival index (GI), bleeding on probing, probing pocket depth (PPD), and clinical attachment level (CAL) evaluated. Serum IL-1β and IL-6 levels were quantified using enzyme-linked immunosorbent assay.
Results PLI, GI, PPD, and CAL were significantly higher in patients with CP + CHD compared to those with CP. Serum levels of IL-1β and IL-6 were also si
A field experiment was carried out during the 2020 season at the College of Agricultural Engineering/ University of Baghdad, Al-Jadriya to evaluate the effect of dry farming when applying water stress under the subsurface drip irrigation system on water productivity and rice yield. The experiment was conducted with three levels of irrigation water stress when 10, 20 and 40% of the available water was depleted and in three dimensions between drip lines 10, 15 and 20 cm. The experiment was designed according to a randomized complete block design, according to the split plot design, with three replications. Determine the depth of irrigation water depending on the moisture depletion of th
وفقأ للدراسات السابقة تم تحضير ليكاند آزو جديد (ن-(3-اسيتايل-2-هيدروكسي-5-مثيل-فنيل)ن-(4-كاربوكسي-سايكلوهكسيل مثيل)-ملح الدايازونيوم) وبعد التحقق من الصيغة المقترحة وفق نتائج التحاليل وبعد استخدام الليكاند لتحضير سلسلة ن المعقدات باستخدام نسب مولية متساوية (1:1) من الليكاند وتفاعلها مع كل من املاح المنغنيز والكوبلت والنيكل والنحاس والخارصين وبعد التحقق وفق تقنيات التحاليل الطيفية والتشخيصية(الاشعة فوق البنف
... Show MoreThe pure and Sb doped GeSe thin films have been prepared by thermal flash evaporation technique. Both the structural and optical measurement were carried out for as deposited and annealed films at different annealing temperatures.XRD spectra revealed that the all films have one significant broad amorphous peak except for pure GeSe thin film which annealed at 573 K, it has sharp peak belong to orthorhombic structure nearly at 2θ=33o . The results of the optical studies showed that the optical transition is direct and indirect allowed. The energy gap in general increased with increasing annealing temperature and decreased with increase the ratio of Sb dopant. The optical parameters such as refractive index, extinction coefficient and r
... Show MoreSo far synthesis of Gonadotropin Releasing Hormone (GnRH) analogues reported in the literature has clarified some aspects of structural activity of the naturally released GnRH. As a part of continuing efforts for further understanding of this relationship, the present investigation was undertaken which involved synthesis and biological evaluation of two GnRH analogues, firstly, by replacement of the amino acid L-Argenine in the 8th position at the backbone structure of the natural hormone by the amino acid D-Alanine; and secondly, by replacement of the amino acid L-Glycine in the 10th position by D-Alanine also at the backbone structure of the nature hormone, to obtain the following analogues respectively:
P
... Show More