Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Bacterial contamination of AL-Habania and AL-Tharthar reservoirs were studied during the period from February 2001 to January 2002, samples were collected from four stations in AL-Habania reservoir (AL-Warrar, AL-Theban regulator, middle of the reservoir and the fourth was towards AL-Razzaza reservoir) and from two stations at AL-Tharthar reservoir (Ein AL-Hilwa and the middle of the reservoir). Coliform bacteria, faecal Coliforms, Streptococci, faecal Streptococci and total count of bacteria were used as parameters of bacterial contamination in waters of both reservoirs through calculating the most probable number. Highest count of Coliform bacteria (15000 cell/100ml) was recorded at Ein AL-Hilwa and lowest count at AL-Theban regulator
... Show MoreBackground: The integration of modern computer-aided design and manufacturing technologies in diagnosis, treatment planning, and appliance construction is changing the way in which orthodontic treatment is provided to patients. The aim of this study is to assess the validity of digital and rapid prototyped orthodontic study models as compared to their original stone models. Materials and methods: The sample of the study consisted of 30 study models with well-aligned, Angle Class I malocclusion. The models were digitized with desktop scanner to create digital models. Digital files were then converted to plastic physical casts using prototyping machine, which utilizes the fused deposition modeling technology. Polylactic acid polymer was chose
... Show MoreBackground: Periodontal diseases are initiated by microbial plaque, which accumulates in the sulcular region and induces an inflammatory response. The Receptor activator of nuclear factor-kappa B ligand / osteoprotegerin (RANKL/OPG) axis is involved in the regulation of bone metabolism in periodontitis, in which an increase in receptor activator of nuclear factor-kappa B ligand or a decrease in osteoprotegerin can tip the balance in favor of osteoclastogenesis and the resorption of alveolar bone that is the hallmark of periodontitis. This study was performed to investigate the role of salivary levels of RANKL and OPG in pathogenesis of chronic periodontitis. Subjects and Methods: Fifty five subjects with chronic periodontitis with ages rang
... Show More
330
Number (42) 13 Ramadan 1436 H 30 June 2015
Abu Muhsin al-Thaqafi oscillating between disobedience and obedience
Research Summary
This research deals with the impact of Islam on the poetry of the veterans who realized ignorance and Islam
Persistent and shifting perspective in their poetry, especially those that talk about
Topics deprived of Islam, such as hair, for example. It is known that the description of alcohol is common in
Pre-Islamic poetry, and the Arabs were proud to drink it as proud of their heroism and Frosithm,
And drinking alcohol was associated with religious roots, they thought that the drinker acquires the attributes of God,
He can do the things that gods do, and humans can not. A
Many cases of gravitational bullets are reported in developed and non-developed countries. However, few papers highlighted these cases in the literature. In our study, we present two cases of gravitational bullets that have an unusual coincidence in the injury characteristics through their ages, and gender, the site of the inlet.
The Gender study is consider one of the concepts which the Postmodernism reached
after the end of Modernism, where the first one has limited the criticism study choices before
the second after closed many doors of subjects which was enriched by researches.
It is pretty clear that the root of this concept belongs to the Linguistics which provided
the Criticism with a countable reasons of it is growth.
The attention in the study of gender in Feminine Literature and Criticism increased in
Arabic studies since the early years of twenty one century, so this research is presented to be
an introduction to this subject which could pave the way to more studies.
In addition to the Gender studies this research deals with ano
The research is divided into three chapters, the first of them to the research problem and its importance and its purpose and its limits, while the second chapter review of contemporary sculpture as a vision and concept, The third chapter came to view the most important results reached by the search.
Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.
In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py
... Show MoreThis research examines the phenomenon of the Arabic language repeated in the Qur'an and poetry, as some morphological formulas are valid in their uses and indications in more than one way. search).