Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (21)
Crossref
Publication Date
Wed Mar 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Oily Wastewater Treatment Using Expanded Beds of Activated Carbon and Zeolite
...Show More Authors

Two types of adsorbents were used to treat oily wastewater, activated carbon and zeolite. The removal efficiencies of these materials were compared to each other. The results showed that activated carbon performed some better properties in removal of oil. The experimental methods which were employed in this investigation included batch and column studies. The former was used to evaluate the rate and equilibrium of carbon and zeolie adsorption, while the latter was used to determine treatment efficiencies and performance characteristics. Expanded bed adsorber was constructed in the column studies. In this study, the adsorption behavior of vegetable oil (corn oil) onto activated carbon and zeolite was examined as a function of the concentr

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Multi – Linear in Multiple Nonparametric Regression , Detection and Treatment Using Simulation
...Show More Authors

             It is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Investigation Desulfurization Method Using Air and Zinc Oxide/Activated Carbon Composite
...Show More Authors

In present work examined the oxidation desulfurization in batch system for model fuels with 2250 ppm sulfur content using air as the oxidant and ZnO/AC composite prepared by thermal co-precipitation method. Different factors were studied such as composite loading 1, 1.5 and 2.5 g, temperature 25 oC, 30 oC and 40 oC and reaction time 30, 45 and 60 minutes. The optimum condition is obtained by using Tauguchi experiential design for oxidation desulfurization of model fuel. the highest percent sulfur removal is about 33 at optimum conditions. The kinetic and effect of internal mass transfer were studied for oxidation desulfurization of model fuel, also an empirical kinetic model was calculated for model fuels

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 17 2025
Journal Name
Research In Social Sciences
Using Chatbot and ChatGPT as Useful Tools in Scientific Academic Writing
...Show More Authors

This review investigates the practice and influence of chatbots and ChatGPT as employable tools in writing for scientific academic purposes. A primary collection of 150 articles was gathered from academic databases, but it was systematically chosen and refined to include 30 studies that focused on the use of ChatGPT and chatbot technology in academic writing contexts. Chatbots and ChatGPT in writing enhancement, support for student learning at higher education institutions, scientific and medical writing, and the evolution of research and academic publishing are some of the topics covered in the reviewed literature. The review finds these tools helpful, with their greatest advantages being in areas such as structuring writings, gram

... Show More
View Publication
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Color Image Denoising Using Stationary Wavelet Transform and Adaptive Wiener Filter
...Show More Authors

The denoising of a natural image corrupted by Gaussian noise is a problem in signal or image processing.  Much work has been done in the field of wavelet thresholding but most of it was focused on statistical modeling of wavelet coefficients and the optimal choice of thresholds.  This paper describes a new method for the suppression of noise in image by fusing the stationary wavelet denoising technique with adaptive wiener filter. The wiener filter is applied to the reconstructed image for the approximation coefficients only, while the thresholding technique is applied to the details coefficients of the transform, then get the final denoised image is obtained by combining the two results. The proposed method was applied by usin

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Apexification and periapical healing of immature teeth using Mineral Trioxide Aggregate
...Show More Authors

Background: Apexification is a method to induce a calcified barrier in a root with an open apex or the continued apical development of an incomplete root in teeth with necrotic pulp. MTA apexification has several advantages such as it neither gets resorbed, nor weakens the root canal dentin, and also sets in the wet environment. The aim of this study is to evaluate the effectiveness of the use of MTA in apexification and periapical healing of teeth with incomplete root formation and periapical infection. Materials and method: Apexification was carried out on fourteen permanent immature teeth of eleven children aged 7-12 years attended the teaching hospital of College of Dentistry, Baghdad University using mineral trioxide aggregate followed

... Show More
View Publication Preview PDF