Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
A research include of synthesized five member ring, which has been synthesized by condensation of 2-(1-(4- hydroxyphenyl) ethylidene)hydrazine-1-carbothioamide[I] with α-chloro ethylacetate in sodium acetate (fused) to form ethyl 2-(4-(1-((4-oxo-2-thioxopyrrolidin-3-ylidene)hydrazono) ethyl)phenoxy)acetate [II]. After that reacted [II]with hydrazine hydrate to resulting compound [III]. Compound [III] was refluxed with 4-aminobenzoicacid in excess of phosphorus oxy chloride give compound [IV],the later compound [IV] interact with acetyl acetone or ethylacetoacetate give to pyrazole and pyrazoline derivatives[V],[VI]. While when reacted with different aromatic aldehydes and one ketone consistence Schiff base derivatives [VII]a-e . The FTIR a
... Show MoreAs we have said that the reasons for abortion are many and varied them to be for
the purpose of treatment or the protection of the mother of the loss or that the abortion
of an act intended purpose of birth control or other reasons is the statistics that are
spread in the world that about 50-60 million abortions annually in the world If this
abortion criminal who is loss of the lives of fetuses and a disgrace to the preachers to
the progressive and liberal, secular, and because they were not able to maintain
human life after leaving the obligation to approach Islam and because life support is
the highest things, which is one of the necessities of the five obligatory street
maintenance came verses warn those who un
The importance of the research lies in developing flexibility exercises (positive and negative) that help improve the level of physical and skill performance, address some weak points, and develop factors that work to implement skills with a wider range of motion, accuracy, and high strength. This is what makes the game of badminton more developed and successful. Performing (dimensions) strokes And the forward projection) by not using the wrist and the correct movement of the striking arm. This makes the player’s performance ineffective, which requires her to practice flexibility and movement flow to address this weakness. The study aims to prepare exercises using flexibility (positive and negative) and to know the e
... Show MoreBackground: Pregnancy is considered a major risk factor for development and progression of periodontal disease. There are hormonal changes in both estrogen and progesterone hormones in addition to bacterial effect and poor oral hygiene that will enhance development of periodontal disease in pregnant women. Materials and methods: Seventy subjects were enrolled in the study, the subjects with an age range (20-35) years old without any history of systemic disease. The subjects were divided into 20 non-pregnant women they represent the control group (G I), 30 pregnant women with gingivitis (GII) and 20 pregnant women with periodontitis (GIII).All periodontal parameters (plaque index, gingival index, bleeding on probing, probing pocket depth an
... Show MoreWe presented here a 25years old lady with a multiple hatdtid cysts in lung and liver and spleen in large number in each organ. Which regarded inoperable and difficult to treared.We use medical treatment with antihelimenthes drugs in new regime and follow-up over 1year clinically, laboratory investigations, U/s and CT.scan. There was good disappearance of liver and spleen cysts with very good response in lungs.
Mobile ad-hoc networks (MANETs) are composed of mobile nodes communicating through wireless medium, without any fixed centralized infrastructure. Providing quality of service (QoS) support to multimedia streaming applications over MANETs is vital. This paper focuses on QoS support, provided by the stream control transmission protocol (SCTP) and the TCP-friendly rate control (TFRC) protocol to multimedia streaming applications over MANETs. In this study, three QoS parameters were considered jointly: (1) packet delivery ratio (PDR), (2) end-to-end delay, (3) and throughput. Specifically, the authors analyzed and compared the simulated performance of the SCTP and TFRC transport protocols for delivering multimedia streaming over MANETs.
... Show MoreMarriage is a characteristic of the human race, as it is one of the oldest organization, asoldas human beign marrige is a legitimale relationsbip between male and female in the name of Allah "o mankind !Be dutiful to your lord, Who created you from a single person (Adam), and from him (Adam) He created his Wife (Eve), and from them both He created mang men and women
Marriage is a requirement of human life to ensure tle continuity and survival of the human species and established it in a legal, social and legitimate frame,according to certain criteria and conditions so that the individual earns psychological and social comfort in the name of Allah and Allah has made for you Azwaj ( mates or wives), sons and grand sons, and has bestowed