Preferred Language
Articles
/
URYvYocBVTCNdQwClUl_
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB domain. The applied modulation technique is based on making uniform quantization to the block mean value of the color bands. The tests indicated that the proposed block mean modulation method of the sprite blocks showed robust watermark embedding; it was capable to withstand against lossy JPEG.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 24 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map
...Show More Authors

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Obesity Impact on Heart Rate Variability Indices and the Modulation Effect of Regular Physical Activity.
...Show More Authors

Background: Obesity is imposing a growing threat to world health. The autonomic nervous system (ANS) regulates visceral functions via balance between sympathetic and parasympathetic divisions. In the cardiovascular system (CVS) this non stationary balance results in the fluctuation between intervals of consecutive heart beats, so called heart rate variability (HRV). Obesity is one of the causative co-morbid conditions leading to metabolic and cardiac disorders as it is accompanied with varied combinations of abnormalities in the ANS, one view is that obese people have higher sympathetic tone. HRV measures the effect of autonomic function on the heart alone. Therefore, it could be the most useful method to investigate the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
Video Colorization Methods: a Survey
...Show More Authors

Nowadays, there are a huge number of video colorization methods. This is because in the gray scale image one value (gray) must be converted into three corresponding values (RGB). In this paper, some of these methods have been presented and discussed. Then, different comparisons have been established between these methods and the results demonstrate the efficiency of each method.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 19 2019
Journal Name
Iraqi Journal Of Science
Static and Dynamic Video Summarization
...Show More Authors

Video represented by a large number of frames synchronized with audio making video saving requires more storage, it's delivery slower, and computation cost expensive. Video summarization provides entire video information in minimum amount of time. This paper proposes static and dynamic video summarization
methods. The proposed static video summarization method includes several steps which are extracting frames from video, keyframes selection, feature extraction and description, and matching feature descriptor with bag of visual words, and finally save frames when features matched. The proposed dynamic video summarization
method includes in general extracting audio from video, calculating audio features

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Video Steganography Method Based DWT
...Show More Authors

The video steganography is a technique to hide information inside video file.Whereas video Steganography is a very important task in real life where the users want to keep data, so the steganography process used for the secure data transmission from the sender to receiver through the internet. Least significant bit (LSB) insertion technique operates on LSB bit of the media file to hide the information bit. In this paper steganography technique used to hide the information inside compressed video as development of a standard method in order to benefit from the advantages of the compression process, which added to the video, these features are reduce storage size of video, and reduce bandwidth to transfer data in faster way with save time

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
Determine the Radon Gas Level Using the GIS Technique for Baghdad City
...Show More Authors

In this work, radon concentrations in the polluted environment were measured within the Baghdad sample surface soil conservation, and this was done using a RAD-7 mobile detector. The work consists of four parts:
The first part includes calculating the latitude and longitude of each point of the study area using the Global Positioning System (GPS). The second part of which includes Determination of 222Rn gas concentrations in surface soil samples. In the northeast part of Baghdad, the highest concentration of radon was found in Al-
Shaab area (3.11 ±175.33 Bq / m3), while the lowest gas concentration in AL Gzeera area (6.67±73.00 Bq/ m3), In the northwest part of Baghdad, the highest concentratio

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 09 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Evaluation of Rebamipide Film using Casting Technique for Local Action
...Show More Authors

Abstract

The aim of this study was to prepare rebamipide ocular inserts in order to extend its release on the ocular surface for dry eye treatment. Solubility study was applied to the drug with or without l-arginine using different solvents. Solvent casting technique was used to prepare the inserts; l-arginine was used to solubilize the drug, hydroxypropyl methylcellulose grades (E5 and K15M) and poly ethylene glycol 200 were used as excipients. The inserts were evaluated for their physical and mechanical properties, moisture loss% and absorption %, surface pH, and in-vitro drug release. The use l-arginine exhibited an enhancement of rebamipide solubility in both deionized water and phosphate buffer (pH 7.4) by a

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of psychosocial domain of quality of life for women who had undergone hysterectomy
...Show More Authors

Abstract A descriptive (cross sectional) study was conducted to assess psychosocial domain of quality of life for (100) women who had hysterectomy for non malignant indications during 6-12 months post operative. The study carried out in both consultation clinics of Al-Elwiya Maternity Hospital and Baghdad Teaching Hospital from January 5th 2003 to July 10th 2003). The results of the study show that hysterectomy achieved a highly successful outcome in terms of psychological and social adjustments for hysterectomies women, a highly significant differences between quality of life (QoL) and some of demographic cha

... Show More
View Publication Preview PDF