Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 11 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluating Health-Related Quality of Life (HRQoL) in Iraqi Adult and Pediatric Patients with Beta-Thalassemia Major Using Two Different Iron Chelation Therapies
...Show More Authors

 

 

View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Using Iterative Reweighting Algorithm and Genetic Algorithm to Calculate The Estimation of The Parameters Of The Maximum Likelihood of The Skew Normal Distribution
...Show More Authors

Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Prediction of Un-Cored Intervals Using FZI Method and Matrix Density Grouping Method: A Case Study of Abughirab Field/Asmari FM., Iraq
...Show More Authors

Knowledge of permeability is critical for developing an effective reservoir description. Permeability data may be calculated from well tests, cores and logs. Normally, using well log data to derive estimates of permeability is the lowest cost method. This paper will focus on the evaluation of formation permeability in un-cored intervals for Abughirab field/Asmari reservoir in Iraq from core and well log data. Hydraulic flow unit (HFU) concept is strongly related to the flow zone indicator (FZI) which is a function of the reservoir quality index (RQI). Both measures are based on porosity and permeability of cores. It is assumed that samples with similar FZI values belong to the same HFU. A generated method is also used to calculate permea

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Hydrology
Boosted artificial intelligence model using improved alpha-guided grey wolf optimizer for groundwater level prediction: Comparative study and insight for federated learning technology
...Show More Authors

View Publication
Scopus (48)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Polski Merkuriusz Lekarski
Design, synthesis, insilco study and biological evaluation of new isatin-sulfonamide derivatives by using mono amide linker as possible as histone deacetylase inhibitors
...Show More Authors

Aim: To evaluate the cytotoxic activity of newly synthesized a series of novel HDAC inhibitors comprising sulfonamide as zinc binding group and Isatin derivatives as cap group joined by mono amide linker as required to act as HDAC inhibitors. Materials and Methods: The utilization of sulfonamide as zinc binding group joined by N-alkylation reaction with ethyl-bromo hexanoate as linker group that joined by amide reaction with Isatin derivatives as cap groups which known to possess antitumor activity in the designed of new histone deacetylase inhibitors and using the docking and MTT assay to evaluate the compounds. Results: Four compounds have been synthesized and characterized successfully by ART-FTIR, NMR and ESI-Ms. the compounds w

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Analytical Methods
Determination of pharmaceuticals in freshwater sediments using ultrasonic-assisted extraction with SPE clean-up and HPLC-DAD or LC-ESI-MS/MS detection
...Show More Authors

A robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.

View Publication
Scopus (26)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Oral Medicine And Oral Surgery
Evaluating dental implant stability using three devices Osstell<sup>®</sup>, Periotest<sup>®</sup>, and AnyCheck<sup>®</sup>: a clinical study
...Show More Authors

Introduction: Implant stability is usually measured with resonance frequency analysis (RFA) and damping capacity assessment (DCA). This study aimed to measure primary and secondary stabilities using 3 devices that are based on these methods, namely; RFA (Osstell®) and DCA (Periotest® and AnyCheck®) to assess the correlations of the measurements obtained by these devices and the correlations between implant stability and insertion torque. Material and Methods: This observational prospective study included 35 dental implants. The implant stability was measured using the 3 devices. Mann–Whitney U

... Show More
View Publication
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Optics
The inter-planner parameter and the blue shift of band gap of titanium dioxide thin films prepared using the DC reactive magnetron sputtering
...Show More Authors

Titanium dioxide (TiO2) thin films were prepared under different pressures with values (15, 30, 60 and 120) Pa using the DC reactive magnetron homemade system with mixed gases of argon and oxygen in ratio (50:50). The result of X-ray diffraction patterns discovered that the structure of the deposited films was polycrystalline, including the phase of anatase. All the appeared peaks were matched to the planes (101), (004), (105), and (211) of diffracted states. Both the intensities and the number of the appeared peaks are declined according to the increased pressure, and the plane of (101) is be considered the preferential grown plane, it is taking a maximum texture factor. Both the lattice constant and the atomic inter-planer spacing take th

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
I-manager’s Journal On Communication Engineering And Systems
SOLVING NETWORK CONGESTION PROBLEM BY QUALITY OF SERVICE ANALYSIS USING OPNET
...Show More Authors

Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r

... Show More
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
On-Line Navigational Problem of a Mobile Robot Using Genetic Algorithm
...Show More Authors