Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
In the current study, remote sensing techniques and geographic information systems were used to detect changes in land use / land cover (LULC) in the city of Al Hillah, central Iraq for the period from 1990 - 2022. Landsat 5 TM and Landsat 8 OLI visualizations, correction and georeferencing of satellite visuals were used. And then make the necessary classifications to show the changes in LULC in the city of Al Hillah. Through the study, the results showed that there is a clear expansion in the urban area from 20.5 km2 in 1990 to about 57 km2 in 2022. On the other hand, the results showed that there is a slight increase in agricultural areas and water. While the arid (empty) area decreased from 168.7 km 2 to 122 km 2 in 2022. Long-term ur
... Show MoreWe have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.
The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F
... Show MoreA simple, accurate and sensitive spectrophotometric method for the determination of Procaine penicillin (PP) is described. The method is based on charge-transfer reaction of PP with metol (N-methyl-p-hydroxy aniline) in the presence of ferric sulphate to form a purple-water soluble complex ,which is stable and has a maximum absorption at 510 nm .A graph of absorbance versus concentration shows that Beer’s low is obeyed over the concentration range of 3-80 µg /ml of PP (i.e.,3-80 ppm) with a molar absorbativity of 4.945 ×103 L.mol-1.cm-1 ,Sandell sensitivity of 0.1190 µg cm-2 ,a relative error of (-1.57)-2.79 % and a standard deviation of less than 0.59 depending on the concentration of PP.The optimum conditions for full co
... Show MoreIn this research, optical communication coding systems are designed and constructed by utilizing Frequency Shift Code (FSC) technique. Calculations of the system quality represented by signal to noise ratio (S/N), Bit Error Rate (BER),and Power budget are done. In FSC system, the data of Nonreturn- to–zero (NRZ ) with bit rate at 190 kb/s was entered into FSC encoder circuit in transmitter unit. This data modulates the laser source HFCT-5205 with wavelength at 1310 nm by Intensity Modulation (IM) method, then this data is transferred through Single Mode (SM) optical fiber. The recovery of the NRZ is achieved using decoder circuit in receiver unit. The calculations of BER and S/N for FSC system a
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreA strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as
... Show MoreIn this study, experimental and numerical applied of heat distribution due to pulsed Nd: YAG laser surface melting. Experimental side was consists of laser parameters are, pulse duration1.3
This paper introduces some properties of separation axioms called α -feeble regular and α -feeble normal spaces (which are weaker than the usual axioms) by using elements of graph which are the essential parts of our α -topological spaces that we study them. Also, it presents some dependent concepts and studies their properties and some relationships between them.
Bioethanol produced from lignocellulose feedstock is a renewable substitute to declining fossil fuels. Pretreatment using ultrasound assisted alkaline was investigated to enhance the enzyme digestibility of waste paper. The pretreatment was conducted over a wide range of conditions including waste paper concentrations of 1-5%, reaction time of 10-30 min and temperatures of 30-70°C. The optimum conditions were 4 % substrate loading with 25 min treatment time at 60°C where maximum reducing sugar obtained was 1.89 g/L. Hydrolysis process was conducted with a crude cellulolytic enzymes produced by Cellulomonas uda (PTCC 1259).The maximum amount of sugar released and hydrolysis efficiency were 20.92 g/L and 78.4 %, respectively. Sugars
... Show More