Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
كان لسياسات االحتالل دور بارز في فشل مشروع إعادة بناء الدولة في افغانستان، وفي الوقت نفسه تتحمل دول االحتالل المسؤ و لية الكاملة عن بعض هذه ً كبي ارً السياسات مثل عدم التخطيط الجيد لمرحلة االحتالل وإعادة بناء الدول ة، ثم إن جزءا من فشل هذه السياسات يرجع الى البيئتين المحلية واإلقليمية ، كذلك كان للخبرة السياسية والدستورية وللواقع االجتماعي الثقافي األفغاني تأثيرهما المهم في قدرة المجتمع األفغاني ً على قبول
... Show MoreEl español es una lengua hablada por una ingente comunidad que abarca varios cientos de millones de personas. Son muchas las palabras con distintos significados que se escriben de similar manera. Hablamos, por ejemplo, de dos de ellas: el adjetivo solo y el adverbio sólo.
En este trabajo se plantea un estudio del adverbio sólo, palabra invariable cuya función consiste en (complementar la significación del verbo) y solo es un adjetivo (califica a un sustantivo).¿Cómo diferenciarlas para evitar errores ortográficos? Así, en estos casos (solo/ sólo), la distinción la da la tilde en la primera vocal. Ésta es la
... Show MoreThe words in the Holy Qur’an are distinguished by the
accuracy of expression, their elegance, the lightness of their
performance, the harmony of their timbre, as well as the ease of
their pronunciation. We find the coarse words in which the
movement of sounds and the hesitation of the soul are mixed, as
it was distinguished by the abundance of its words indicating the
same meaning without a phenomenon that the reader or the
listener notices
تتراوح ضريبة الارض ما بين 10%من المحصول (الشعير ) و 40 -50 من الخراج
The main purpose of the present research is to identify emotional intelligence for college students and its relation to gender (male-female) , and to identify shyness for college students and its relation to gender(male-female)and to identify the relationship between emotional intelligence and shyness. The sample of the present research consisted of (200) college students , (100)male students and (100)female students randomly selected. scale for measuring emotional intelligence as prepared consists of (46) items according to Golmans theory distributed into five subscales and these are : (self-awareness , emotion management, motivation, sympathy and social skills) and Alobaidi shyness scale is used to assess shyness and it consist
... Show More
Social networking sites have become very popular since the beginning of the current decade and have become linked to our daily life. We follow the news, Analyses and opinions on the one issue in a way that attracts millions of users and the number grows every secon On Twitter, one of the most important social networking sites, all social groups rushed from the president to the last citizen to open accounts when they found themselves forced to do so . During the recent Gulf crisis, Twitter was buzzing with Twitter, which achieved the largest circulation globally. Instead of serving the issue and directing it to serve the Arab interest, most of the publications were on th |
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show More