Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
This study was conducted at the Poultry Research Station of the Agricultural Research Department/Ministry of Agriculture in Abu Ghraib for the period from 25/2/2019 to 7/4/2019 (42 days) with the aim of using several levels of Spirulina (SP)
Mammals are under threat worldwide due to deforestation, hunting, and other human activities. In Iraq, a total of 93 species of wild mammals have been recorded including species with global conservation concern. Bamo Mountain is situated within the Zagros Mountains in northern Iraq which is a suitable habitat for wild mammals. Due to scarcity of the field survey efforts and cryptic behavior, monitoring of the wild mammals fauna in Zagros Mountain seems challenging. Therefore, we used a camera trap which seems to be an ideal way to determine species diversity of wild mammals in Bamo Mountain. Moreover, interviews with local villagers were performed. The mammalian diversity of Bamo Mountain is not fully explored but seemed threatened by lo
... Show MoreIn this study, we investigate the behavior of the estimated spectral density function of stationary time series in the case of missing values, which are generated by the second order Autoregressive (AR (2)) model, when the error term for the AR(2) model has many of continuous distributions. The Classical and Lomb periodograms used to study the behavior of the estimated spectral density function by using the simulation.
Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThe research aims at the identity of the accounting information and its characteristics, and then to study the possibility of using accounting information in rationalizing the decisions of capital expenditure. The study relied upon the descriptive analytical approach it is suitable to the nature of this study, the hypotheses of the study were tested by using a number of statistical methods by relying on statistical package program (SPSS), and the research concluded that the companies listed in Khartoum Stock Exchange using accounting information in the comparison between investment alternatives available and estimating the number of years required to recover of the investment cost, the challenges that cause weakness in using the
... Show Moreمن خلال ملاحظة الباحثتين الميدانية لمستوى الأداء الفني لمنتخب ناشئات القطر بالجمناستك لمهارة قفزة اليدين الأمامية على جهاز منصة القفز الحديثة لاحظن وجود مشكلة تكمن في ضعف هذا الأداء والذي يؤثر على بعض المتغيرات البيوكينماتيكية لهذه المهارة مما يؤدي إلى عدم أداء المهارة بالشكل الصحيح ، وتعزو الباحثتان ذلك الضعف إلى قلة الدفع بالرجلين والذراعين . لذا ارتأت الباحثتان إجراء هذا البحث الذي يهدف إلى تنمية القوة
... Show MoreFor aspirin estimated, a molecularly imprinted polymer MIP-ASP electrodes were generated by electro-polymerization process, the electrodes were prepared by combining the template (aspirin) with (vinyl acetate (VA), 1-vinylimidizole (VIZ) as a functional monomer and N, N-methylene bisacrylamide (MBAA) as crosslinkers using benzoyl peroxide (BPO) as an initiator. The efficiency of the membrane electrodes was analyzed by differential pulse voltammetry (DPV). Four electrodes were synthesized using two different plasticizers, di-butyl sebacate (DBS), di-octyl phthalate (DOP) in PVC matrix. Scanning electron microscopy (SEM) was used to describe the generated MIP, studying the electrodes properties, the slope, detection limit, and life
... Show MoreThe research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show MoreAmong several separation processes, the air flotation distinguish as remarkably high potential separation process related to its high separation efficiency and throughput, energy-efficient, simple process, cost-effective, applicable to a wide range of oily wastewater and no by-products. The current study aimed to investigate the effect of the type and concentration of surfactant on the stability of oil-water emulsion and efficiency of the separation process. For this purpose, three types of surfactant where used (anionic SDS, mixed nonionic Span 85/Tween 80, and cationic CTAB). The results demonstrated that the Span 85/Tween 80 surfactant has the best stability, and it increases with the surfactant concentration augmentation. The removal ef
... Show More