Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on video copyright protection and deduplication. A video copyright and deduplication scheme in cloud storage environments using the H.264 compression algorithm and SHA-512 hashing technique is proposed. This paper proposes a combined copyright production and deduplication based on video content to authenticate and to verify the integrity of the compressed H.264 video. The design of the proposed scheme consists of two modules. First, a H.264 compression algorithm is applied on the given video by the user. Second, a unique signature in different time interval of the compressed video is generated by the user in such a way that the CSP can use it to compare the user’s video against other videos without compromising the security of the user’s video. To avoid any attacker to gain access to the hash signature during uploading to the cloud, the hash signature is encrypted with the user password. Some experimental results are provided, showing the effectiveness of our proposed copyright protection and deduplication system.
Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had
... Show MoreThe technological developments in the field of communication have witnessed considerable impact in the variables which exist in following up and conveying the events which link it’s meaning to political implications. This makes a number of satellite channels depend on the techniques of propaganda and use them in the news bulletins to achieve political aims and ends related to its formational directives where those channels allotted a considerable time in its programming transmission map to concentrate on the security and political status to complete the image of the informational scene according to the logic of its propaganda and styles in processing news for daily events.The technological developments in the field of communication hav
... Show MoreIn this article we study the variance estimator for the normal distribution when the mean is un known depend of the cumulative function between unbiased estimator and Bays estimator for the variance of normal distribution which is used include Double Stage Shrunken estimator to obtain higher efficiency for the variance estimator of normal distribution when the mean is unknown by using small volume equal volume of two sample .
Several stress-strain models were used to predict the strengths of steel fiber reinforced concrete, which are distinctive of the material. However, insufficient research has been done on the influence of hybrid fiber combinations (comprising two or more distinct fibers) on the characteristics of concrete. For this reason, the researchers conducted an experimental program to determine the stress-strain relationship of 30 concrete samples reinforced with two distinct fibers (a hybrid of polyvinyl alcohol and steel fibers), with compressive strengths ranging from 40 to 120 MPa. A total of 80% of the experimental results were used to develop a new empirical stress-strain model, which was accomplished through the application of the parti
... Show MoreApium graveolens has been utilized for a multitude of purposes due to its diverse pharmacological characteristics. On the other hand, little is known about how the fatty acids (saturated and unsaturated) terpenes and steroids found in Iraqi Apium graveolens affect the human cancer cells. The purpose of this study was to examine the effects of Iraqi Apium graveolens petroleum ether extract on the human prostate cancer cell line (PC3). Subsidiary extraction and phytochemical analysis by GC/MS were performed.The dry and fresh aerial parts (leaves and stem) of Apium graveolens were extracted using a Soxhlet device with 70 % ethanol, then fractionated with petroleum ether. Then Gas Chromatography System was used to identify the bioactive
... Show MoreDomesticated translation has been for a long time the norm in cultural communication between nations all over the world. The texts are translated mainly into English (being the dominant language) in terms dictated principally by the requirements of the target language (English). The claim has been that fluency, readability, and immediate intelligibility can be guaranteed as far as the reader of the target language is concerned (English). The foreignness of the text (of the culture which produced it) would be not preserved. Not only this. Being the language of predominant cultures, English has become number one among languages into which texts are translated. The imbalance has been noticeable between the volumes of works translated from a
... Show MoreTo get access into the orbital floor 3 paths are commonly used which are transconjunctival, subciliary and subtarsal approaches. Each one of these approaches has its advantages and disadvantages. The study assessed the outcomes of the transconjunctival retroseptal approach, which reflects our experience in this type of surgery. Along 8 years, 26 patients received in the emergency room diagnosed with pure isolated orbital floor fractures, all of them admitted to the maxillofacial surgery department and approached by transconjunctival incision without lateral canthotomy. Three types of complications occurred: laceration of the lower eyelid, injury to the lacrimal system and entropion. All of these complications were managed accordingly with n
... Show More