Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Medicine Advances
Quality of life, adherence and knowledge of epileptic patients and the impact of a pharmacist‐led educational intervention: A review
...Show More Authors

Around 65 million individuals suffer from epilepsy worldwide, and when it is not properly treated, it is linked to higher rates of physical harm and mortality. Due to the requirement for long‐term therapy and the side effects of many medications, medication compliance is a significant issue. The purpose of this review was to summarize the findings of previous studies examining the quality of life (QOL), adherence, patient education, and medication knowledge, as well as the impact of a pharmacist‐led educational intervention. Additionally, to find out if these studies benefit epileptic patients, to find the appropriate method used to help them in all aspects of their lives, and to use these in future studies. A systematic and comprehensi

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of Education And Health Promotion
Patient experience between vibration and coughing techniques during subcutaneous insulin injection on pain severity and individual satisfaction: Randomized controlled trial
...Show More Authors
BACKGROUND:

Diabetes mellitus represents a chronic illness distinguished by sustained elevations in blood glucose concentrations, and it ranks as the sixth foremost cause of mortality globally.

MATERIALS AND METHODS:

This randomized controlled experimental study was conducted consisted of 105 patients divided into three groups (36 vibration group, 38 coughing technique group, and 31 control group) who applied subcutaneous insulin injections in hospitalized adults’ patients with type 2 diabetes between September 2024 and January 2025 to examine the effect of the cou

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu May 29 2025
Journal Name
Bmc Public Health
Coping skills and associated sociodemographic, clinical, and psychological factors among women with breast cancer in Iraq: a cross-sectional study”
...Show More Authors

Background: Coping skills play a vital role in managing the physical and psychological effects of breast cancer (BC). Despite improvements in early detection and treatment, Breast cancer survivors continue to face long-term challenges after diagnosis. Therefore, this study aims to evaluate the coping skills employed by breast cancer women in Iraq and to identify the sociodemographic, clinical, and psychological factors associated with these coping skills. Methods: A cross-sectional study was conducted among 244 breast cancer women in The Medical City Teaching Oncology Hospital, Baghdad, Iraq, from August 2023 to October 2023, coping skills and psychological factors were assessed using the BRIEF COPE-28, and Hospital Anxiety Depression scale

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
استعمال انحدار الاسقاطات المتلاحقة و الشبكات العصبية في تجاوز مشكلة البعدية
...Show More Authors

المستخلص يهدف هذا البحث الى تجاوز مشكلة البعدية من خلال طرائق الانحدار اللامعلمي والتي تعمل على تقليل جذر متوسط الخطأ التربيعي (RMSE) , أذ تم  استعمال طريقة انحدار الاسقاطات المتلاحقة  (PPR)    ,والتي تعتبر احدى طرائق اختزال الابعاد التي تعمل على تجاوز مشكلة البعدية (curse of dimensionality) , وان طريقة (PPR) من التقنيات الاحصائية التي تهتم بأيجاد الاسقاطات الاكثر أهمية في البيانات المتعددة الابعاد , ومع ايجاد كل اسقاط

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 29 2023
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
Yolo Versions Architecture: Review
...Show More Authors

Deep learning techniques are applied in many different industries for a variety of purposes. Deep learning-based item detection from aerial or terrestrial photographs has become a significant research area in recent years. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed.  A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles and classification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing

... Show More
View Publication
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Geological Journal
Development of 1D-Synthetic Geomechanical Well Logs for Applications Related to Reservoir Geomechanics in Buzurgan Oil Field
...Show More Authors

Knowledge of the distribution of the rock mechanical properties along the depth of the wells is an important task for many applications related to reservoir geomechanics. Such these applications are wellbore stability analysis, hydraulic fracturing, reservoir compaction and subsidence, sand production, and fault reactivation. A major challenge with determining the rock mechanical properties is that they are not directly measured at the wellbore. They can be only sampled at well location using rock testing. Furthermore, the core analysis provides discrete data measurements for specific depth as well as it is often available only for a few wells in a field of interest. This study presents a methodology to generate synthetic-geomechani

... Show More
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Yolo Versions Architecture: Review
...Show More Authors

Deep learning techniques are used across a wide range of fields for several applications. In recent years, deep learning-based object detection from aerial or terrestrial photos has gained popularity as a study topic. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles andclassification probabilities for an image. In layman's terms, it is a technique for instantly identifying and rec

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of Techno strategy of Information management in achieving administrative innovation : A case study in the college of Management and Economics / University of Kirkuk
...Show More Authors

The present research aims to identify and define the basic dimensions of the information management strategy and the administrative creativity in the Faculty of Management and Economics / the University of Kirkuk, as well as the role played by the dimensions of the information technology management strategy in achieving the administrative innovation in the college and the research problem was formulated in several questions. The research problem was formulated in several questions centered on the correlation between the research variables, and the research was based on a major hypothesis and five sub-hypotheses emerged from which it was subjected to several tests to ensure its validity. The researcher used the descriptive-analyti

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Characteristics and pattern of organizational structure for general inspectors offices :Testing Research
...Show More Authors


    
Concentrated research topic in addressing variable vital to the work of offices of inspectors general, construction and scale effectiveness and efficiency is the organizational structure, which are important as is obvious to any researcher in the management and organization and this variable would affect the exercise task supervision and inspection of financial and administrative corruption and combat efficiently, Thus this effect will be placed in the fold ability to achieve goals. That the creation of the organizational structure and requirements to achieve harmony between its properties is creating step towards success. This research aims to analyze the characteristics and style o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Evaluation of Information Security Management System in the Iraqi Commission for Computers and Informatics according to the International Standard (ISO 27001: 2013)
...Show More Authors

    The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations  dependence on computers and information technology in work and communication  with others. The international legitimacy (represented by the  International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi

... Show More
View Publication Preview PDF
Crossref