Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
The relative strength index (RSI) is one of the best known technical analysis indicators; it provides the speculators by prior signals about the future stock’s prices, and because the speculations in shares of companies which listed in the Iraq Stock Exchange have a high degree of risk, like risk of shares prices felling, so the speculators became committed to use some methods to reduce these risks, and one of these methods is the technical analysis by using the relative strength index (RSI) which enable the speculators of choosing the right time for buy and sell the stocks and the right time to enter or leave the market by using the historical rice data. And from here the problem of the research formulated as “Is the using of
... Show MoreThis study used a continuous photo-Fenton-like method to remediate textile effluent containing azo dyes especially direct blue 15 dye (DB15). A Eucalyptus leaf extract was used to create iron/copper nanoparticles supported on bentonite for use as catalysts (E@B-Fe/Cu-NPs). Two fixed-bed configurations were studied and compared. The first one involved mixing granular bentonite with E@B-Fe/Cu-NPs (GB- E@B-Fe/Cu-NPs), and the other examined the mixing of E@B-Fe/Cu-NPs with glass beads (glass beads-E@B-Fe/Cu-NPs) and filled to the fixed-bed column. Scanning electron microscopy (SEM), zeta potential, and atomic forces spectroscopy (AFM) techniques were used to characterize the obtained particles (NPs). The effect of flow rate and DB15 concent
... Show MoreObjectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.
... Show More???? ?? ??? ????? ???? ?????? ?????????? ????? ??????? ???? ?????? ????? ??? ??? ????? ?? ???? ??? ????? ????? ???? ????? ????? ?? 0-3cm, 10cm, 20cm, 30cm, 40cm ???????? ????? ?? ???? ????? ???????? ?? ???? ????? ?????? CR-39??????? ?? ??? ??? ?????????? ???????????? ???????? ???? n.cm-2.s-1 5 x 103?? ?????? ?????????? Am241- Be??? ???? ??????? ????????? ??? ?? ???? ????? ?????????? ??? ?? ????? ??????? ?????? 0.881±0.086??? ?? ??????? ????? ??? ????? ??? ?? ????? ????? ??? ???????? ???0.441±0.036 ??? ?? ???????
This in vitro study evaluated the influence of chemomechanical caries removal solution on the surface topography of metal-ceramic feldspar porcelain (MAJOR ceramic) and All-ceramic feldspar porcelain (Vita Alpha) using light polarizing microscope. Forty specimens of MAJOR ceramic and forty specimens of Vita Alpha ceramic of (12mm diameter & 3mm height) were prepared .All specimens were polished with silicon polishing burs, cleaned, autoglazed and stored in 37°C before exposure to Carisolv. Thirty specimens of each material randomly exposed to Carisolv gel for 5, 10 and 20 minutes respectively, other ten specimens were not, to act as control group. All specimens were subjected to surface roughness test by profilometer and evalua
... Show MoreAbstract
This study aims to identify the reality of using electronic applications in teaching language skills to people with mild intellectual disabilities from the mothers’ perspective. A descriptive approach was used. The electronic questionnaires were administered to the study sample, 122 responses were received from mothers of the students with mild intellectual disability in Hafer Al-Baten schools. The response average rate was 94%. The results showed that there are statistically significant differences that are related to the variant of monthly income as for the barriers to using electronic applications in such schools, whereas there were no differences regarding the variant of monthly income regarding t
... Show MorePeriodontal disease is typically treated with mechanical debridement of the tooth surface. It may, however, be insufficient to eradicate pathogenic microorganisms on its own. Because of the microbial etiology of periodontitis, systemic or local antibiotic therapy is used as an adjunct treatment. The present study aimed to determine the effects of curcumin gel on Porphyromonas gingivalis. Eleven patients with stage II and III periodontitis were registered in the study. A double-blinded split-mouth design followed. Periodontal pockets were distributed into 2 groups; the test group received scaling and root planing along with curcumin gel, while the control group received scaling and root planing along with a placebo gel. Plaque index,
... Show More