Preferred Language
Articles
/
URYvYocBVTCNdQwClUl_
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB domain. The applied modulation technique is based on making uniform quantization to the block mean value of the color bands. The tests indicated that the proposed block mean modulation method of the sprite blocks showed robust watermark embedding; it was capable to withstand against lossy JPEG.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Digital Watermarking in Color Image Based On Joint Between DCT and DWT
...Show More Authors

The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 07 2015
Journal Name
Journal Of Infrared, Millimeter, And Terahertz Waves
Distinguishing Gasoline Engine Oils of Different Viscosities Using Terahertz Time-Domain Spectroscopy
...Show More Authors

View Publication
Scopus (27)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Jul 25 2022
Journal Name
2022 Ieee 20th International Conference On Industrial Informatics (indin)
Robust Continuous Sliding Mode Controller for Uncertain Canonical Brunovsky Systems Using Reduced Order Extended State Observer
...Show More Authors

A reduced-order extended state observer (RESO) based a continuous sliding mode control (SMC) is proposed in this paper for the tracking problem of high order Brunovsky systems with the existence of external perturbations and system uncertainties. For this purpose, a composite control is constituted by two consecutive steps. First, the reduced-order ESO (RESO) technique is designed to estimate unknown system states and total disturbance without estimating an available state. Second, the continuous SMC law is designed based on the estimations supplied by the RESO estimator in order to govern the nominal system part. More importantly, the robustness performance is well achieved by compensating not only the lumped disturbance, but also its esti

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Robust Circular S and Circular Least Squares Estimators for Circular Regression Model using Simulation
...Show More Authors

In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the

... Show More
View Publication
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
An Application Domain Based on General Object Oriented Software Models
...Show More Authors

Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Robust Computed Torque Control for Uncertain Robotic Manipulatorss
...Show More Authors

This paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem.  The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Improving Video Watermarking through Galois Field <i>GF</i>(2<sup>4</sup>) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Robust Estimation OF The Partial Regression Model Using Wavelet Thresholding
...Show More Authors

            Semi-parametric regression models have been studied in a variety of applications and scientific fields due to their high flexibility in dealing with data that has problems, as they are characterized by the ease of interpretation of the parameter part while retaining the flexibility of the non-parametric part. The response variable or explanatory variables can have outliers, and the OLS approach have the sensitivity to outliers. To address this issue, robust (resistance) methods were used, which are less sensitive in the presence of outlier values in the data. This study aims to estimate the partial regression model using the robust estimation method with the wavel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 20 2017
Journal Name
International Journal Of Social Sciences
THE EFFECTIVENESS OF USING YOUTUBE VIDEO ON EFL IRAQI COLLEGE STUDENTS' PERFORMANCE IN GRAMMAR AT MISSAN UNIVERSITY
...Show More Authors

FR Almoswai, BN Rashid, PEOPLE: International Journal of Social Sciences, 2017 - Cited by 22

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF