Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Background: The integration of modern computer-aided design and manufacturing technologies in diagnosis, treatment planning, and appliance construction is changing the way in which orthodontic treatment is provided to patients. The aim of this study is to assess the validity of digital and rapid prototyped orthodontic study models as compared to their original stone models. Materials and methods: The sample of the study consisted of 30 study models with well-aligned, Angle Class I malocclusion. The models were digitized with desktop scanner to create digital models. Digital files were then converted to plastic physical casts using prototyping machine, which utilizes the fused deposition modeling technology. Polylactic acid polymer was chose
... Show MoreBackground: Periodontal diseases are initiated by microbial plaque, which accumulates in the sulcular region and induces an inflammatory response. The Receptor activator of nuclear factor-kappa B ligand / osteoprotegerin (RANKL/OPG) axis is involved in the regulation of bone metabolism in periodontitis, in which an increase in receptor activator of nuclear factor-kappa B ligand or a decrease in osteoprotegerin can tip the balance in favor of osteoclastogenesis and the resorption of alveolar bone that is the hallmark of periodontitis. This study was performed to investigate the role of salivary levels of RANKL and OPG in pathogenesis of chronic periodontitis. Subjects and Methods: Fifty five subjects with chronic periodontitis with ages rang
... Show MoreMany cases of gravitational bullets are reported in developed and non-developed countries. However, few papers highlighted these cases in the literature. In our study, we present two cases of gravitational bullets that have an unusual coincidence in the injury characteristics through their ages, and gender, the site of the inlet.
The Gender study is consider one of the concepts which the Postmodernism reached
after the end of Modernism, where the first one has limited the criticism study choices before
the second after closed many doors of subjects which was enriched by researches.
It is pretty clear that the root of this concept belongs to the Linguistics which provided
the Criticism with a countable reasons of it is growth.
The attention in the study of gender in Feminine Literature and Criticism increased in
Arabic studies since the early years of twenty one century, so this research is presented to be
an introduction to this subject which could pave the way to more studies.
In addition to the Gender studies this research deals with ano
Broyden update is one of the one-rank updates which solves the unconstrained optimization problem but this update does not guarantee the positive definite and the symmetric property of Hessian matrix.
In this paper the guarantee of positive definite and symmetric property for the Hessian matrix will be established by updating the vector which represents the difference between the next gradient and the current gradient of the objective function assumed to be twice continuous and differentiable .Numerical results are reported to compare the proposed method with the Broyden method under standard problems.
The optimum separators operating pressure is determined by using flash calculations and equilibrium ratios. In this study, the optimum separator size for Jambur field is calculated by using equations introduced by Arnold and Stewart and API12J Specification [1]. Because Jambur field has a high production rate two conditions are taken in the study to determine separator size, first based on production rate 80,000 bbl/day and second based on split the production between two banks A and B (40,000 bbl/day for each bank). The calculation resulted in optimum separator pressure for the first stage of 700 psi, and the second stage of 300 psi, and the third stage of 120 psi. The results show that as the number of stages increased above three-stag
... Show MoreA total of four types of instant dry yeast
We study clusters in warm dark matter (WDM) models of a thermally produced dark matter particle 0.5 keV in mass. We show that, despite clusters in WDM cosmologies having similar density profiles as their cold dark matter (CDM) counterparts, the internal properties, such as the amount of substructure, show marked differences. This result is surprising as clusters are at mass scales that are a thousand times greater than that at which structure formation is suppressed. WDM clusters gain significantly more mass via smooth accretion and contain fewer substructures than their CDM brethren. The higher smooth mass accretion results in subhaloes which are physically more extended and less dense. These fine-scale differences can be probed by strong
... Show MoreThe present article includes an experimental study of the behavior of dry and saturated dense sandy soil under the action of a single impulsive load. Dry and saturated dense sand models were tested under impact loads. Different falling masses from different heights were conducted using the falling weight deflectometer (FWD) to provide the single pulse energy. The responses of dense soils were evaluated at surface of soil under impact load. These responses include; displacements, velocities, and accelerations that are developed due to the impact acting at top and the displacement at different depths within the soil using the falling weight deflectometer (FWD) and accelerometers (ARH-500A waterproof, and low capacity acceleration tran
... Show MoreThe research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So, the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs in the laws and regula
... Show More