Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.
Faces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processe
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
In this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detec
... Show Moreأثر استراتيجية التدريس البصري باستخدام الانـفوجرافيك في التحصيل والتفكير البصري لدى طلاب المرحلة المتوسطة فـي مادة الرياضيات
Education received the attention of the monarchy in Iraq, especially after the developments that the country witnessed after Iraq gained independence and joined the League of Nations in 1932 AD in all political, economic and cultural aspects. In this regard, due to its distinguished geographical location, where the atmosphere, the natural environment and the religious and political standing were available, which made it a center of attraction for most Iraqi families and political figures.
أختير مشروع مزرعة فدك في محافظة النجف االشرف المستثمر من العتبة العلوية المقدسة. يقع المشروع في الجهة الشمالية شرقا ة عرض ''54.38 '57 º31 الـــــــــــى ً الغربية لمحافظة النجف االشرف بين خطي طول ''18.78 '0 º 44 الى ''53.46 '7 º44 ودائر ''17.53 '2 º32 شماال بمساحة اجمالية للمشروع تقدر بـــ 35493 هكتار لتقييم بعض الصفات الكيميائية للترب الصحراوية في تحديد دليل نوعيتها وصحتها لمشروع مزرعة فدك/ محافظة النجف االشرف، اذ تم اخذ 40 عينة سطحية
... Show Moreيهدف هذا البحث الى تقويم الأنشطة والأسئلة التقويمية المتضمنة في محتوى كتاب الحاسوب للصف الخامس الإعدادي وفق التفكير الإبداعي ومقترحات تطويرها، وذلك بالإجابة عن السؤال الآتي: ما نسبة توافر مهارات التفكير الإبداعي في الأنشطة والأسئلة التقويمية المتضمنة في محتوى كتاب الحاسوب المقرر لطلبة الصف الخامس الإعدادي (الاحيائي والتطبيقي، والادبي) من وزارة التربية العراقية/ المديرية العامة للمناهج في العام الدراسي (2
... Show Moreهدف هذا البحث الى استعمال الأسلوب الرياضي أسلوب التحليل الهرمي وتطبيقه وفق ابعاد بطاقة الاداء المتوازن في تقييم الأداء الاستراتيجي في الهيئة العامة للأثار والتراث، وتمثلت أدوات البحث باستعمال استمارات التحليل الهرمي وطبقت على معايير بطاقة الأداء المتوازن المتمثلة في (المالي، الزبائن، العمليات الداخلية، والتعلم والنمو)، وتم استهداف عينة قصدية متمثلة في رئيس الهيئة والمدراء العامون بعض من مدراء الأقسام ال
... Show More