Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
With the fast-growing of neural machine translation (NMT), there is still a lack of insight into the performance of these models on semantically and culturally rich texts, especially between linguistically distant languages like Arabic and English. In this paper, we investigate the performance of two state-of-the-art AI translation systems (ChatGPT, DeepSeek) when translating Arabic texts to English in three different genres: journalistic, literary, and technical. The study utilizes a mixed-method evaluation methodology based on a balanced corpus of 60 Arabic source texts from the three genres. Objective measures, including BLEU and TER, and subjective evaluations from human translators were employed to determine the semantic, contextual an
... Show MoreBP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.
A new ligand (H4L) and its complexes with ( ZnII, CdII and HgII) were prepared. This ligand was prepared in two steps. In the first step a solution of terephthaldehyde in methanol was reacted under reflux with 1,2-phenylenediamine to give an precursor compound which reacted in the second step with 2,4-dihydroxybenzaldehyde to give the ligand. The complexes were then synthesized by direct reaction of the corresponding metal chloride with the ligand. The ligand and complexes were characterized by spectroscopic methods FT-IR, UV-Vis, 1 HNMR, and atomic absorption, chloride content, HPLC, mole-ratio determination. in addition to conductivity measurement. The data of these measurements suggest a distorted tetrahedral geometry for ZnII, C
... Show MoreTannin acyl hydrolase as the common name of tannase is an inducible extracellular enzyme that causes the hydrolysis of galloyl ester and depside bonds in tannins, yielding gallic acid and glucose. The main objective of this study is to find a novel gallic acid and tannase produced by
Azo ligand 4-((2-hydroxy-3,5-dimethylphenyl)diazenyl) benzoic acid was synthesized from 4-aminobenzoic acid and 2,4- dimethylphenol. Azo dye compounds have been characterized by different techniques (1H-NMR, UV-Vis and FT-IR). Metal chelates of (ZnII, CdII and HgII) have been synthesized with azo ligand (L). Produced compounds have been identified by using spectral studies, elemental analysis(C.H.N.) and conductivity. Produced metal chelates were studied using mole ratio as well sequences contrast types. Rate of concentration(1×10-4-3×10-4 Mole/L) sequence Beer's law. Compound solutions have been noticed height molar absorptivity. The addendum of ligand and compounds has applied as disperse dyes on cotton fabrics for antibacterial activit
... Show MoreThe place in which the person lives and his geographical and social environment have a great impact on building his personality, belief and culture, Islam has alerted the importance of the Muslim to make sure to choose the appropriate place in which he resides and dwells in that it is compatible with his religion and belief in order to ensure communication with Islamic knowledge in a way that enhances his belief Arabization occurs when a person makes himself an Arab by living the life of the Bedouins, and creates the morals of the Bedouins from the inhabitants of the Badia with its harshness, cruelty, ignorance and lack of understanding in religion and far from the sources of knowledge of Islamic knowledge. Blasphemy and polytheism, and
... Show MoreABSTRACT : Bacillus cereus and Pseudomonas aeruginosa is the ability to produce a wide antimicrobial active compounds (Bacillin and S-Pyocin) against pathogenic microorganism. In vitro assay with the antagonists of both crude bacteriocin and partial by precipitation 75% ammonium sulfate showed that the effectively inhibited growth of the following (Candida kefyer and Fusarium spp) and Propionibacterium acnes. The results showed the inhibition zone of reached Bacillin (9-13 mm), while Pyocin (13 - 16mm) in solid medium.
New complexes of the some trivalent transition metal ions of the uracil such as [M(Ura)3Cl3] and mixed ligand metal complexes with uracil and oxalic acid [M(Ura)2(OA)(OH2)Cl].H2O type, where (Ura)=Uracil, (OA= Oxalic acid dihydrate, (M= Cr+3 and Fe+3) were synthesized and characterized by the elemental analysis, FT.IR, electronic spectra, mass spectra and magnetic susceptibility as well as the conductivity measurements. Six–coordinated metal complexes were suggested for the isolated complexes of Cr+3 and Fe+3 with molecular formulas dependent on the nature of uracil and oxalic acid present. The proposed molecular structure for all complexes with their ions is octahedral geometries. The antibacterial efficiency was tested of metal salts, l
... Show More