Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Abstract
Abstract has many advantages as has historically been one of the regions leading cultural centers . for centuries , it has been a center of commertial and financial operations in Iraq. it is also rich in archeological sites and natural resources, but because of its wars and implementation of urban development strategies are effective and sustainable , so contracted the secretariat of Baghdad with the company (khatib and scirntiffic) for the preparation of the comprehensive development plan for the city of Baghdad in 2030 and funded by the world bank and the fact that the plan was approved ( three stages of it ) and only one phase remains the fourth stage, which is under discussion the aim of the
... Show MoreAlthough the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreAbstract
In this work, diabetic glucose concentration level control under disturbing meal has been controlled using two set of advanced controllers. The first set is sliding mode controllers (classical and integral) and the second set is represented by optimal LQR controllers (classical and Min-, ax). Due to their characteristic features of disturbance rejection, both integral sliding mode controller and LQR Minmax controller are dedicated here for comparison. The Bergman minimal mathematical model was used to represent the dynamic behavior of a diabetic patient’s blood glucose concentration to the insulin injection. Simulations based on Matlab/Simulink, were performed to verify the performance of each controll
... Show MoreCommunicative-based textbooks are developed and disseminated throughout the country.
However, it is difficult for teachers who themselves have learnt English through the traditional
approaches to suddenly be familiar with CLT (Communicative Language Teaching) principles
and teach communicatively. Therefore, many teachers remain somewhat confused about what
exactly CLT is and others familiar with CLT but unable to achieve communicative classroom
teaching. Consequently, those teachers need to be introduced to the CLT principles and they need
training in how to put CLT principles into practice. Accordingly, this study aims to find out the
effect of combining video lectures and Kolb experiential learning on EFL student-t
Four rapid, accurate and very simple derivative spectrophotometric techniques were developed for the quantitative determination of binary mixtures of estradiol (E2) and progesterone (PRG) formulated as a capsule. Method I is the first derivative zero-crossing technique, derivative amplitudes were detected at the zero-crossing wavelength of 239.27 and 292.51 nm for the quantification of estradiol and 249.19 nm for Progesterone. Method II is ratio subtraction, progesterone was determined at λmax 240 nm after subtraction of interference exerted by estradiol. Method III is modified amplitude subtraction, which was established using derivative spectroscopy and mathematical manipulations. Method IIII is the absorbance ratio technique, absorba
... Show MoreUnconfined compressive strength (UCS) of rock is the most critical geomechanical property widely used as input parameters for designing fractures, analyzing wellbore stability, drilling programming and carrying out various petroleum engineering projects. The USC regulates rock deformation by measuring its strength and load-bearing capacity. The determination of UCS in the laboratory is a time-consuming and costly process. The current study aims to develop empirical equations to predict UCS using regression analysis by JMP software for the Khasib Formation in the Buzurgan oil fields, in southeastern Iraq using well-log data. The proposed equation accuracy was tested using the coefficient of determination (R²), the average absolute
... Show MoreIn this paper, first we refom1Ulated the finite element model
(FEM) into a neural network structure using a simple two - dimensional problem. The structure of this neural network is described
, followed by its application to solving the forward and inverse problems. This model is then extended to the general case and the advantages and di sadvantages of this approach are descri bed along with an analysis of the sensi tivity of
... Show MoreAbstract: Background: Optical biosensors offer excellent properties and methods for detecting bacteria when compared to traditional analytical techniques. It allows direct detection of many biological and chemical materials. Bacteria are found in the human body naturally non-pathogenic and pathologically, as they are found in other living organisms. One of these bacteria is Escherichia coli (E. coli) which are found in the human body in its natural and pathogenic form. E.coli bacteria cause many diseases, including Stomach, intestines, urinary system infections, and others. The aim of this study: is sensing and differentiation between normal flora and pathogenic E.coli. Material and method:
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show More