Preferred Language
Articles
/
EBYyu4sBVTCNdQwCGdmX
Video Copyright Protection
...Show More Authors

Illegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the chaotic map (tent map) was used to choose a number of frames which are greater or equal to the number of blocks of the watermark. The host frame selection method makes the discovery of the watermark information by illegal means very complicated. The experimental results show that the proposed method can produce excellent transparency with robustness against some attacks where the average_ PSNR reaches to 72.806.

Scopus Crossref
View Publication
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
Social Protection and its Impact on the Cohesion of Vulnerable Groups: A Field Study of a Sample Social Protection Network Beneficiaries: دينا داود محمد المولى
...Show More Authors

Social protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION: PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION
...Show More Authors

Consumer protection requires seeking one official entity to accomplish its tasks. The large number of devices control and implementation in it, return to several ministries, and executive bodies lose coordination and cooperation, and unite efforts to eliminate the types of fraud and control the quality of production within the approved standards. This is in addition to the seriousness of the existence of administrative and legal corruption which hinders the role of inspection committees and representatives of official bodies with the relationship and prevents them from carrying out their duties entrusted to them or presenting them with administrative complications to thwart their duties in consumer protection. This is despite the

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Annales Pharmaceutiques Françaises
Adopting video assignments as a tool to improve first-year pharmacy students class engagement
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Cathodic Protection for Above Ground Storage Tank Bottom Using Data Acquisition
...Show More Authors

Impressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.

In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 15 2024
Journal Name
Journal Of Legal Sciences
Criminal Protection of Human Genome “Human Gene Editing as a Model”
...Show More Authors

Lawful protection of the human gene conceded a moral concern regarding the future of existence human. After the discovery of the human genetic map, scientific experiments and research related to the human gene increased, negative applications of genetic engineering  in particular that violate essential human rights,  the right to human dignity to be specific. These practices represent actual challenges to the existence and diversity of current and future generations. Therefore, the presence of legal rules at the domestic and global levels is an absolute necessity to prohibit these threats and determine civil and criminal accountability for those who infringe any laws related to this issue.

View Publication
Publication Date
Fri Oct 02 2020
Journal Name
International Journal Of Pharmaceutical Research
Corrosion Protection of Carbon Steel in Saline Solution Using Plant Extracts
...Show More Authors

View Publication
Scopus (4)
Scopus Crossref