Preferred Language
Articles
/
bsj-5112
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 09 2025
Journal Name
Petroleum And Coal
Extraction and Analysis of Compressional, Shear, and Stoneley Slowness, Rock Mechanical Properties, and Shear Anisotropy Using Sonic Scanner Data
...Show More Authors

The Sonic Scanner is a multifunctional instrument designed to log wells, assess elastic characteristics, and support reservoir characterisation. Furthermore, it facilitates comprehension of rock mechanics, gas detection, and well positioning, while also furnishing data for geomechanical computations and sand management. The present work involved the application of the Sonic Scanner for both basic and advanced processing of oil-well-penetrating carbonate media. The study aimed to characterize the compressional, shear, Stoneley slowness, rock mechanical properties, and Shear anisotropy analysis of the formation. Except for intervals where significant washouts are encountered, the data quality of the Monopole, Dipole, and Stoneley modes is gen

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
أسلوب بيز في تحليل البيانات غير التامة
...Show More Authors

In this paper we will explain ,how use Bayesian procedure in analysis multiple linear regression model with missing data in variables X's  as the new method suggest , and explain some of missing  Patterns under missing mechanism , missing complete at random MCAR and compare Bayesian estimator with complete case estimator by use  simulation procedure .           

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Computer Applications
Mobile Position Estimation based on Three Angles of Arrival using an Interpolative Neural Network
...Show More Authors

In this paper, the memorization capability of a multilayer interpolative neural network is exploited to estimate a mobile position based on three angles of arrival. The neural network is trained with ideal angles-position patterns distributed uniformly throughout the region. This approach is compared with two other analytical methods, the average-position method which relies on finding the average position of the vertices of the uncertainty triangular region and the optimal position method which relies on finding the nearest ideal angles-position pattern to the measured angles. Simulation results based on estimations of the mobile position of particles moving along a nonlinear path show that the interpolative neural network approach outperf

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
International Middle Eastern Simulation And Modelling Conference 2022, Mesm 2022,
MECHANICS OF COMPOSITE PLATE STRUCTURE REINFORCED WITH HYBRID NANO MATERIALS USING ARTIFICIAL NEURAL NETWORK
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
River Water Salinity Impact on Drinking Water Treatment Plant Performance Using Artificial neural network
...Show More Authors

The river water salinity is a major concern in many countries, and salinity can be expressed as total dissolved solids. So, the water salinity impact of the river is one of the major factors effects of water quality. Tigris river water salinity increase with streamline and time due to the decrease in the river flow and dam construction from neighboring countries. The major objective of this research to developed salinity model to study the change of salinity and its impact on the Al-Karkh, Sharq Dijla, Al-Karama, Al-Wathba, Al-Dora, and Al-Wihda water treatment plant along Tigris River in Baghdad city using artificial neural network model (ANN). The parameter used in a model built is (Turbidity, Ec, T.s, S.s, and TDS in)

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Modeling of Corrosion Rate Under Two Phase Flow in Horizontal Pipe Using Neural Network
...Show More Authors

The present study develops an artificial neural network (ANN) to model an analysis and a simulation of the correlation between the average corrosion rate carbon steel and the effective parameter Reynolds number (Re), water concentration (Wc) % temperature (T o) with constant of PH 7 . The water, produced fom oil in Kirkuk oil field in Iraq from well no. k184-Depth2200ft., has been used as a corrosive media and specimen area (400 mm2) for the materials that were used as low carbon steel pipe. The pipes are supplied by Doura Refinery . The used flow system is all made of Q.V.F glass, and the circulation of the two –phase (liquid – liquid ) is affected using a Q.V.F pump .The input parameters of the model consists of Reynolds number , w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 11 2003
Journal Name
Iraqi Journal Of Laser
The Use of Pulse Frequency Modulation Technique for Optical Video Communication System
...Show More Authors

An optical video communication system is designed and constructed using pulse frequency modulation (PFM) technique. In this work PFM pulses are generated at the transmitter using voltage control oscillator (VCO) of width 50 ns for each pulse. Double frequency, equal width and narrow pulses are produced in the receiver be for demodulation. The use of the frequency doubling technique in such a system results in a narrow transmission bandwidth (25 ns) and high receiver sensitivity.

View Publication Preview PDF
Publication Date
Wed May 29 2019
Journal Name
Iraqi Journal Of Physics
Synthesis and characterization of Iron tungstate oxide films by advanced controlled spray pyrolysis technique
...Show More Authors

For the first time Iron tungstate semiconductor oxides films (FeWO4) was successfully synthesized simply by advanced controlled chemical spray pyrolysis technique, via employed double nozzle instead of single nozzle using tungstic acid and iron nitrate solutions at three different compositions and spray separately at same time on heated silicone (n-type) substrate at 600 °C, followed by annealing treatment for one hour at 500 °C. The crystal structure, microstructure and morphology properties of prepared films were studied by X-ray diffraction analysis (XRD), electron Scanning Electron Microscopy (SEM) and Atomic Force Microscopy (AFM) respectively. According to characterization techniques, a material of well-crystallized monoclinic ph

... Show More
View Publication Preview PDF
Crossref