Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat
... Show MoreThe study of biomechanical indicators in the arc of the run and the upgrading stage is one of the important variables that affect the nature of the upgrading and thus affect the result of the race due to the importance of these stages and the consequent variables during the last steps. That’s why, the jump-trainings based on assistant means or body weight positively affect the step-time for each of the three steps in the acceleration arc. As well as, it focuses on the momentary strength of each step at this stage. It also significantly affects the speed of motor performance to suit the activity in which the runner needs to perform perfect steps with high flow in order to convert the horizontal speed to a vertical one. This is achieved thr
... Show Moreprotein oxidation through oxidative stress, which represents the overall status of the protein in the cell/tissue. Due to their increased levels of AOPPs were reported during T2DM. The aim of this study was to assess AOPP level in T2DM subjects with foot ulcer (DFU) and explore its correlation with infection. Type 2 diabetic patients (n=108) and healthy subjects (n=25) were enrolled in this study. The T2DM group was subdivided to diabetic patients without complications (n=25) and eighty-three (83) of them have diabetic foot. They were sub- grouped into two groups according to presence Osteomyelitis and abscess, and in reliance on medical analysis of WBC count and CRP. Group of diabetic without superficial or deep ulcer and no osteomyelitis
... Show MoreAutorías: Ghassan Adeeb Abdulhasan, Falih Hashim Fenjan, Hussein Jabber Abood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2022. Artículo de Revista en Dialnet.
This paper aims to find new analytical closed-forms to the solutions of the nonhomogeneous functional differential equations of the nth order with finite and constants delays and various initial delay conditions in terms of elementary functions using Laplace transform method. As well as, the definition of dynamical systems for ordinary differential equations is used to introduce the definition of dynamical systems for delay differential equations which contain multiple delays with a discussion of their dynamical properties: The exponential stability and strong stability
Genome sequencing has significantly improved the understanding of HIV and AIDS through accurate data on viral transmission, evolution and anti-therapeutic processes. Deep learning algorithms, like the Fined-Tuned Gradient Descent Fused Multi-Kernal Convolutional Neural Network (FGD-MCNN), can predict strain behaviour and evaluate complex patterns. Using genotypic-phenotypic data obtained from the Stanford University HIV Drug Resistance Database, the FGD-MCNN created three files covering various antiretroviral medications for HIV predictions and drug resistance. These files include PIs, NRTIs and NNRTIs. FGD-MCNNs classify genetic sequences as vulnerable or resistant to antiretroviral drugs by analyzing chromosomal information and id
... Show More