Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of various methodologies in the field was created. Unlike previous studies that focused on picture splicing or copy-move detection, this study intends to investigate the universal type-independent strategies required to identify image tampering. The work provided analyses and evaluates several universal techniques based on resampling, compression, and inconsistency-based detection. Journals and datasets are two examples of resources beneficial to the academic community. Finally, a future reinforcement learning model is proposed.
Abstract
The research aims to diagnose the reality of applying the eighth requirement (operation) of the business continuity management system according to the international standard (ISO 22301: 2019), in the General Tax Authority, which is related to planning, implementing and controlling specific processes and procedures to address risks and opportunities, and the research adopted the checklist of the standard ( ISO 22301: 2019), in obtaining information, to measure the extent of application and documentation, the percentages and the weighted arithmetic mean were relied upon, and the research reached a set of result
... Show MoreWelcome to International Journal of Research in Social Sciences & Humanities (IJRSSH). It is an international refereed journal of Social Sciences, Humanities & Linguistics in English published quarterly, both print and online.
This work includes the synthesis and identification of ligand {3-((4-acetylphenyl)amino)-5,5-dimethylcyclohex2-en-1-one} (HL* ) by the treatment of 5,5-dimethylcyclohexane-1,3-dione with 4-aminoacetophenone under reflux. The ligand (HL* ) was identified via FTIR, Mass spectrum, elemental analysis (C.H.N.), 1H and 13C-NMR spectra, UV-Vis spectroscopy, TGA and melting point. The complexes were synthesized from ligand (HL* ) mixed with 3-aminophenol (A) and metal ion M(II), where M(II) = (Mn, Co, Ni, Cu, Zn and Cd) at alkaline medium to produce complexes of general formula [M(L* )(A)] with (1:1:1) molar ratio. These complexes were detected via FT-IR spectra, UV-Vis spectroscopy as well as elemental analysis (A.A) and melting point, conductivit
... Show MoreEvaluation is one of the most important elements of teaching process. The recent trends in evaluation and educational reform movements have called for using alternative evaluation, which focuses on performance evaluation. Authentic assessment is usually described as formative, in which students participate in their acquisition, in addition to the fact that students are productive and active, which is reflected in the students' achievement and skill level. The study aims to reveal the degree of knowledge and use of alternative assessment tools by primary school teachers in Gaza -Palestine. To meet the objective of the study, the researchers used the descriptive-analytical method and the questioner as a study tool. The study sample c
... Show More
Abstract
Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t
... Show MoreDeposits with the Industrial Bank, together with loans received from others, are non-financial financial resources, which are sources of supply to the Industrial Bank of funds that allow the Bank to expand the granting of loans. The increases in this resource indicates that the bank is practicing comprehensive banking, which is consistent with the nature of the transformation of the banking system towards multiple businesses. Therefore, the research comes to highlight the causality of the trend between total deposits and total loans. And if the causality is found, is it one-way or two-way? How long is the impact?
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show More