Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
ﺔﻴﻋﺍﺫﻹﺍ ﺕﺎﻴﻨﻘﺘﻟﺍ ﻡﺍﺪﺨﺘﺳﺍ ﰲ ﲑﺒﻛ ﺭﻮﻄﺗ ﻦﻣ ﻝﺎﺼﺗﻻﺍ ﺮﺼﻋ ﻩﺪﻬﺷ ﻱﺬﻟﺍ ﺖﻗﻮﻟﺍ ﰲ ﺔﻴﻧﻮﻳﺰﻔﻠﺘﻟﺍﻭ ﺍ ﺢﺴﻓ ﰲ ﻢﻬﺳﺃ ﺕﺎﻄﶈﺍ ﺀﺍﻮﺳ ﺔﻴﻧﻮﻳﺰﻔﻠﺘﻟﺍ ﺕﺍﻮﻨﻘﻟﺍ ﺚﺒﻟ ﻊﺳﺍﻮﻟﺍ ﻝﺎ ( ﺔﻴﺿﺭﻷﺍ ﺔﻴﻠﺑﺎﻜﻟﺍ ﻭﺃ ﺔﻴﺋﺎﻀﻔﻟﺍ ﻭﺃ ( ﱵﻟﺍ ﺔﺻﺎﳋﺍ ﺔﻴﺋﺎﻀﻔﻟﺍ ﺕﺍﻮﻨﻘﻟﺍ ﻦﻣ ﺪﻳﺪﻌﻟﺍ ﺭﻮﻬﻇ ﰲ ﺎﻀﻳﺃ ﺪﻋﺎﺳ ﺎﳑﻭ ، ﺕﺎﻴﺋﺎﻀﻔﻟﺍ ﺭﻮﻬﻇ ﻚﻟﺫ ﻞﺒﻗ ﺩﺎﺳ ﻥﺃ ﺪﻌﺑ ﺔﻴﻣﻮﻜﺣ ﲑﻏ ﺕﺎﻴﻌﲨ ﻭ
... Show MoreThe city of Nishapur is one of the cities that had a prominent position and a clear impact on the flourishing of the scientific movement, and this position that it enjoyed was achieved because of the scholars who were incubating them. Who had a great role in the flourishing of scientific life through his scientific activity, as he worked as a teacher for thirty years in its regular school, in addition to his work in rhetoric, preaching and scientific circles, in addition to his many books in various sciences, as he did not specialize in one science only, but rather collected all the sciences of his time and excelled in them. He enriched the Arab and Islamic library with it.
The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show Moreتعد لوحات السيطرة الخاصة بالمراقبة والسيطرة على نوعية الانتاج احدى الاساليب العلمية الاحصائية التي تستخدم لمراقبة سير العملية الانتاجية اثناء سيرالعنلية الانتاجية اثناء سيرها في مراحل الانتاج والتي عادة ما تتكون من حد وسطي وحدين اعلى وادنى للسيطرة على نوعية ودقة الانتاج متمثلا بقيم عددية . ومن ثم فان العملية الانتاجية اما ان تكون تحت السيطرة او خارجها بالاعتماد على قيم المشاهادات العددية. وفي بعض الاحيا
... Show MoreWe have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.
The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F
... Show MoreThe present study is an attempt to throw light on the nature of the US policy regarding the Middle East region as portrayed by AI-Sabah, Al-Mashriq and Tariq Al-Shaab papers over a period of three months from 1st of July to 30th of September 2013.
In writing this study, a number of goals have been set by the researcher. These goals may include but in no way limited to the nature of the US image as carried by the above three papers, the nature of the topics tackled by them and the nature of the Arab countries which received more and extensive coverage than others.
A qualitative research approach is proposed for the study. This approach has allowed the researcher to arrive at definite answers for the possible questions rais
... Show MoreThis research deals with the motives of the use of Facebook by elderly people and the achieved needs, which leads the researcher to ask an important question: why an old persons use Facebook and are the achieved needs through which they got? The research aims to find out the habits and patterns of using Facebook by old men and stands on the main motives of the elderly in their use of Facebook. It also identifies the most prominent needs that have been made for the elderly as a result of their use of Facebook.
The research is a descriptive one in which the researcher uses survey method to achieve the desired goals. The researcher has chosen a group of old men from Diyala province. The total sample number is about
... Show MoreThe main objective and primary concern to every investor not only to achieve a greater return on his or her investments, but also to create the largest possible value of these investments the, researchers and those interested in the field of investment and financial analysis try to develop standards for performance valuation is guided through the  
... Show MoreThe knowledge related with lexical items can be realized as including relations of meaning a cross words. Words that share a similarity of meaning are called to be synonymous, and words that share a contrary of meaning are called to be antonymous. Both of them are universal linguistic phenomenon that exist in terms of linguistic system of every language. The present study aims at finding out areas of difficulty that Iraqi EFL learners encounter in the use of synonymy and antonymy, both on the recognition and production levels. Also tries to detect the main reasons behind such difficulties. A diagnostic test of two parts, namely, recognition and production, is designed. The test is built to include two linguistic phenomenon which are: synony
... Show More