Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
The financial statements must accurately, clearly and fairly present the financial situation and financial statements should be reliable as well. Pursuant to Board Decision No. (74) 2020, CBI obliges banks, according to the Banking Law No. (94) for the year 2004, Article (33) paragraph 2 concerning real estate owned from previous years and expropriated as a result debt settlement , to apply a real estate liquidation provision at a rate of 20% for each property expropriated and at a rate of 100% for each year of delay up to (5) years .also from the significance of the issue of real estates that become a property of banks as a result of debt settlement and the pr
... Show MoreAbstract
The objective of this research is to identify the analysis of the ethics of the administration in the development of the social responsibility of one government organizations, and to achieve the objectives of the research was the use of a questionnaire developed for the purpose of data collection and distribution to the research sample, was chosen as a total sample population (50) individuals were relying on statistical package to do a statistical analysis for this research, user, ANSI (SPSS) simple regression analysis, standard deviation, Pearson correlation coefficient.
Research findings show the role of social responsibility in achieving the university's strategy,
... Show MoreThe research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of t
... Show MoreRepresenting banking supervision An important function performed by the Iraqi Central Bank, in order to achieve stability in the financial and banking system, and safeguard the rights of depositors, investors and other targets, and to realize the Iraqi Central Bank banking supervision actors on banks, there must be an awareness of regulatory bank's existing control and subject them, as well as the role of banking oversight interested in spreading this awareness.
So sought search to find out the role played by the Iraqi Central Bank in raising awareness of the regulatory banking between the parties to the regulatory process, through the presentation and analysis of the legal framework for banking supervision and awareness supervisory
Abstract:
The current research is aimed at analyzing the impact of the dimensions of Job involvement of all of (the enthusiasm, the Devotion, Assimilation ) in the Crystallize organizational Identification across the dimensions of (organizational loyalty, membership, similarities) and was named the Middle East, the Iraqi Investment Bank room to look as the research community of staff adopted in the bank, to be applied to a Random sample of (100) employees working in the said bank, and developed for the purposes of data collection, a questionnaire form included three axes covered (32) paragraph of the measure, which is included adopted Liekrt Quintet for the
... Show MoreLe présent travail aborde la question de l’enseignement de traduction en tant que matière faisant partie du programme élaboré dans des Départements de Français au sein de certaines universités irakiennes, en particulier celle de Bagdad. La méthode d’enseigner suivie constitue une véritable problématique qu’on a bien diagnostiquée à partir de quelques années d’expériences, à la lumière des observations faites dans des cours de traduction professionnelle, et dans la perspective des citations et témoignages établies par des traductologues et pédagogues et principalement par Marianne LEDERER qui a établi la Théorie Interprétative de la traduction. Mais pourquoi l’enseignement lui-même poserait une telle probl
... Show MoreCadmium has been known to be harmful to human healthy , manily Via contaminated drinking water , food supplies , tobacco and industrial pollutant . The aim of this study was to determine the toxicity of new Cadmium (II) complex ( Bis[ 5- ( P- nitrophenyl ) – ? 4 – Phenyl- 1,2,4- triazole -3- dithiocarbamatohydrazide] cadmium (II) Hydra ( 0.5) and compare it with anticancer drug cyclophosphamide ( CP) in female albino mice . This complex causes to several alterations in Enzymatic activity of Glutamate Pyruvate Transaminase (GPT) and Alkaline Phosphatase (ALP ) in three organs after the treatment of mice with different doses of a new cadmium (II) complex ( 0.09 / 0.25ml , 0.18/ 0.5ml and 0.25mg /0.7 ml /30 gm of mous
... Show MoreThe research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of t
... Show More