Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Introduction and Investigation into Oil Well Logging Operations (Review)
...Show More Authors

ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Basic Education
Preparation of Chalcones and their Applications in Heterocycles Synthesis
...Show More Authors

Some new heterocyclic compounds containing, cyclohexenone, indazole, isoxazoline, pyrmidine and pyrazoline ring system were prepared from chalcones (1a,b). The starting chalcones (1a,b) were obtained by a base catalyzed condensation of appropriately substituted benzaldehydes and 2-acetylbenzofuran. The reaction of the prepared chalcones with ethylacetoacetate/hydrazine hydrate, hydroxylamine hydrochloride, urea, thiourea, hydrazine hydrate, phenyl hydrazine or hydrazide derivatives gave the mentioned heterocycles. All synthesized compounds have been characterized by physical and spectral methods.

View Publication
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparation and Characterization of Nay Zeolite for Biodiesel Production
...Show More Authors

Iraqi kaolin was used for the preparation and characterization of NaY zeolite for biodiesel production via esterification reaction. Oleic acid was used usually as a typical simulated feedstock of high acid number for the esterification reaction.

   The chemical composition for the prepared Nay zeolite is as following:  (Ca2.6Na1.K0.1)(Al6.3Si17.7)O48.16H2O, the silica to alumina ratio in the prepared catalyst was found equal to 2.6 and Na2O content was 12.26 wt. %, with relative crystallinity equal to 147.4 % obtained by the X-ray diffraction. The surface area result shows that the prepared catalyst has 330 m2

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Cloud Manufacturing framework for controlling and monitoring of machines
...Show More Authors

Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.

In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Morphological Participation in the Forms of (Faul) and (Fael)
...Show More Authors

This research examines the phenomenon of the Arabic language repeated in the Qur'an and poetry, as some morphological formulas are valid in their uses and indications in more than one way. search).

View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
J. Pharm. Sci. & Res.
Methods of Synthesis Phthalimide Derivatives and Biological Activity-Review
...Show More Authors

Phthalimide formation of Phthalic anhydride with various amines using microwave or without a method with the difference of the catalyst used in a prepared Phthalimide, either structure general are C6H4CONRCO and used as starting materials in synthesis several compounds derivative phthalimides are an important compounds because spectrum wide biological activities including Antimicrobial activity, anticonvulsant activity, Anti-inflammatory activity,Analgesic activity, Anti- influenza activity and Thromboxane inhibitory activity

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
the periodic coincidence points of continuius maps and lindemann's
...Show More Authors

this paper give a proof of known conditions for the existence of peridic conincidence points of continuius maps using lindemann theotem on transcendental numbers

View Publication Preview PDF
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phytochemical Investigation and Antioxidant Activity of Iraqi Tribulus terrestris
...Show More Authors

The aim of the present study was to characterize the Iraqi Tribulus terrestris for the presence of biologically active phyto-chemicals using methanolic extracts of the plant (aerial parts) by Gas Chromatography –Mass spectrometry (GC/MS), while the mass spectra of the compounds found in the extract was matched with the National Institute of Standards and Technology (NIST) library , in addition to study the antioxidant activity of plant extract , results confirmed the presence of therapeutically potent compounds in the Iraqi Tribulus terrestris extract predominantly alkaloids, flavonoids, saponins, tannins and terpenoids. Antioxidant potential of Iraqi Tribulus terrestris

... Show More
View Publication Preview PDF
Crossref (4)
Crossref