Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Artificial intelligence has quickly invaded the realms of both creative and information-based writing, raising new questions about human originality, authorship and style. Despite its ability to produce writings that are coherent and stylistically varied, there are still concerns over the uniqueness and cultural neutrality of AI programs such as ChatGPT. This review covers significant recent advancements with artificial intelligence applications in both the literary and non-literary fields. It analyzes 35 recent studies contrasting authorship and creativity, or stylistic considerations and impressions, between human and AI texts. These studies range from poetic and fictional writing through essay, news article and academic publicati
... Show MoreIraq is Suffering nowadays from the criminal triad represented by the fiscal and administrative corruption, money laundering and terrorism, which are intertwined in a very related relations, as each of them support the other . Since the over growth has been one of its characteristics leaving behind a very dangerous negative effects whether it was social , economic or even political impacts . As a result , this trial is now represents a high risk that threatens the present and the future of Iraq . On the political , economic and social level , it is well to mention that the poor direct investment , the increasing rates of poverty , unemployment , inflation as well as the smuggling of goreign currency an
... Show MoreHow I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid
Since the nineties of the last century, Iraqi youth have been exposed to Mexican soap operas dubbed into classical Arabic, and the stories and ideas presented by these series were almost new to all the minds of the youth at that time, a culture completely different from the culture we have of social relations, and since the number of episodes was more than Of the 100 episodes, exposure to these series has left young people confused by the addiction to all their ideas and stories. They differ from the foreign films (mostly American) that we used to watch, and they only take two hours (at most). These films contain diverse stories and may be forgotten. Memory includes events and characters in their entirety at times, and you may remember th
... Show Moreالمقدمة
الحمد لله رب العالمين، وأفضل السلام وأتم التسليم على سيدنا محمد، وعلى آله وصحبه، أجمعين، وعلى من تبعهم بإحسان إلى يوم الدين، أما بعد.
فإن مسألة التعارض بين الرواية، والفتوى، من المسائل المشهورة عند الأصوليين والفقهاء،وهي من مباحث السنة عند الأصوليين، والتي تبنى عليها مسائل متعددة، وهي من أسباب اختلاف الفقهاء، فإذا ما روى أحد الرواة حديثاً معيناً، ثم عمل بخلاف ما روى، فللعل
... Show MoreAbstract
The basic aim of this research is to study the interactional effect of investing information technology on the relationship between value added intellectual capital and financial performance as literature review suggested on the theoretical level, including previous studies, with the deduction of its trends strongly predicted by research hypotheses and their content associated with the investment in intellectual capital after information technology tools being employed in this direction to improve the financial performance of the studied companies at the levels of both industrial and service sectors, a non-random sample was chosen included (40) forty Iraqi Joint-Stoc
... Show MoreIn the present research synthesis and study of biological activity a series of new polymers modified of chitosan with compounds containing azo group. Beginning diazonium salt produced from 3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine reacted with concentrated HCl acid and sodium nitrite. The coupling reaction between diazonium salt with substituted aromatic aldehyde to produce Azo derivatives )1-6(. Azo Schiff bases Chitosan )7-12( were synthesized by condensation of Chitosan with Azo derivatives )1-6( in ethanol with some drops of glacial acetic acid. The structural modifications of Chitosan ring (linked to a bioactive azo moiety) were expected to give new derivatives )7-12( with a diverse range of biological functions. These compounds' st
... Show MoreThis research addresses the relevance of men and women and the consequent provisions
such as dowry and alimony ... Of the like, marriage is to organize links masculinity and
femininity any sexual meeting between men and women a special system that must be
produces reproduction him and alone, which gets its reproduction in human kind, and has no
family and on the basis of private life is being organized.
The importance of the topic see Islam has urged marriage and forbade celibacy, and ensure
that the Lord of Glory Almighty married subsidy nor the origin of the differences between
men and women in money or workmanship or blue-chip Every Muslim inept any Muslim and
every Muslim efficient for any Muslim.
The impor
The paper is highlighting the athletics and heroic sports which encouraged and played at Greek and Islamic period. The paper is identifying the Islamic athletics and heroic sport and compare them with Greek sports, as it is the model of sports while the sport during the Islamic period was not undertaken by scientific researches or articles even in Wikipedia. Although, this period was encouraged and practice many sports such as archery, sword grappling and wrestling, equestrianism, jogging and running whereas there are many Arabic references revealed during the Islamic 610 A.D. while the Greek and Olympic was known at 732 A.D. The paper is followed the literature review and historical to shied a light scientifically about traditional sports
... Show MoreThe paper is highlighting the athletics and heroic sports which encouraged and played at Greek and Islamic period. The paper is identifying the Islamic athletics and heroic sport and compare them with Greek sports, as it is the model of sports while the sport during the Islamic period was not undertaken by scientific researches or articles even in Wikipedia. Although, this period was encouraged and practice many sports such as archery, sword grappling and wrestling, equestrianism, jogging and running whereas there are many Arabic references revealed during the Islamic 610 A.D. while the Greek and Olympic was known at 732 A.D. The paper is followed the literature review and historical to shied a light scientifically about tradition
... Show More