Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 28 2023
Journal Name
Journal Of Physical Education
The effect of preventive exercises using the (isometric) method and aids to help develop the strength of the thigh muscles of the first-class referees of the Iraqi Premier League
...Show More Authors

The aim of the research is to identify the values of the level of muscular strength of the thighs, as well as to identify the significance of the differences between the pre-tests and the post-tests for the first-class football referees in the Iraqi Premier League. The researchers used the one-group experimental approach for its suitability to the nature of the study problem, and the research sample was from first-class referees in the Iraqi Premier League for the sports season (2022/2023), and their number was (15) referees. They took the comprehensive enumeration method, and special tests were conducted on them in the stadium and the private hall at the Ministry of Youth and Sports Center. After analyzing and discussing the result

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Comparative Study of The Amount of Apically Extrusion Of Debris During Root Canal Preparation Using Wave Oneâ„¢, Trushape 3Dâ„¢, Hyflexâ„¢ CM and One Shapeâ„¢ Instrumentation Systems (An In Vitro Study)
...Show More Authors

Background: Many types of instruments and techniques are used in the instrumentation of the root canal system. These instruments and techniques may extrude debris beyond the apical foramen and may cause post-instrumentation complications. The aim of this study was to evaluate the amount of apically extruded debris resulted by using 4 types of nickel-titanium instruments (WaveOne, TRUShape 3D conforming files, Hyflex CM, and One Shape files) during endodontic instrumentation. Materials and methods: Forty freshly extracted human mandibular second premolar with straight canals and a single apex were collected for this study. All teeth were cut to similar lengths. Pre-weighted glass vials were used as collecting containers. Samples were randoml

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Human Face Recognition Based on Local Ternary Pattern and Singular Value Decomposition
...Show More Authors

There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri May 22 2026
Journal Name
Journal Mustansiriyah Of Sports Science
The effect of using Daniel's model for people with two types of brain control (left and right) to learn the skill of the Cartwheel in artistic gymnastics for second-stage students
...Show More Authors

The research problem focused through the researcher's experience in the gymnastics game and the lack of use of educational models that give the student an important role in the educational process, so it became necessary to identify the type of prevailing style for students, and the need for diversity in the use of educational models based on scientific theories, including the Daniel Document model. Based on three theories of learning, which are structural, behavioral, and meaningful learning. The research aimed to identify the effect of using the Daniel model for people with two types of brain control (left and right) to learn the skill of the Cartwheel in artistic gymnastics for students of the second stage. The researcher used the experi

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraq Journal Of Agricultural Research
THE COMPARATIVE STUDY OF THE TOTAL COSTS AND NET REVENUE OF DIFFERENT TILLAGE SYSTEMS USING TWO TYPES OF SEEDLINGS IN THE PRODUCTION OF BARLEY GREEN VARIETY SAMEER IN THE GYPSUM SOILS
...Show More Authors

Publication Date
Fri Dec 01 2023
Journal Name
Case Studies In Chemical And Environmental Engineering
Removal of copper from a simulated wastewater by electromembrane extraction technique using a novel electrolytic cell provided with a flat polypropylene membrane infused with 1-octanol and DEHP as a carrier
...Show More Authors

View Publication
Scopus (8)
Crossref (9)
Scopus Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
A Mathematical Approach for Computing the Linear Equivalence of a Periodic Key-Stream Sequence Using Fourier Transform
...Show More Authors

A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using TD-ABC technology to determine idle production capacity: An applied research in Al-Wasat Oil Company
...Show More Authors

The aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Journal Of Physical Education
The Effect Of Compound Exercises Using Visual Training Aid On Tactical Performance Of Deaf Soccer League Players
...Show More Authors

S Ali…, Journal of Physical Education, 2019 - Cited by 1

View Publication
Publication Date
Mon Jan 13 2020
Journal Name
Day 3 Wed, January 15, 2020
Numerical Simulation of Gas Lift Optimization Using Genetic Algorithm for a Middle East Oil Field: Feasibility Study
...Show More Authors
<p>Gas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t</p> ... Show More
View Publication
Scopus (15)
Crossref (8)
Scopus Crossref