Preferred Language
Articles
/
ijs-2106
A Review of Software Watermarking
...Show More Authors

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software, as an indicator of copyright ownership for this software. In this paper, the watermarked software will be explained in detail by defining the classification of watermarks software, models of attack, and methods used in software watermarking carried out by several researchers. It seems clearly that the method of ROP algorithm has given the highest accuracy results up to 100%

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 02 2019
Journal Name
Journal Of Legal Sciences
Parts of hire contract to supply specific software: Comparative Study
...Show More Authors

The aim of this study is to know the capability of the Iraqi system law, to organize contracts of supplying software especially the contract of designing or developing software, according to the requirements of somebody. The  specific software features than typical software, where the later imported as a goods, while the incoming contract to designing or developing specific software represents employment contract, in this case leads to a complicated problems of the type of contract, the later contract may interact with sale contract and lease contract. Hire contract applies to the contract of this study, where supplier to these software is contractor and the person who designed the required software, as a result this study can be di

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Developing a Heuristic Algorithm to Solve Uncertainty Problem of Resource Allocation in a Software Project Scheduling
...Show More Authors

     In project management process, the objective is to define and develop a model for planning, scheduling, controlling, and monitoring different activities of a particular project. Time scheduling plays an important role in successful implementation of various activities and general outcome of project. In practice, various factors cause projects to suffer from time delay in accomplishing the activities. One important reason is imprecise knowledge about time duration of activities. This study addresses the problem of project scheduling in uncertain resource environments, which are defined by uncertain activity durations.  The study presents a solution of the levelling and allocation problems for projects that have some uncertain ac

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Secured Mechanism Towards Integrity of Digital Images Using DWT, DCT, LSB and Watermarking Integrations
...Show More Authors

"Watermarking" is one method in which digital information is buried in a carrier signal;
the hidden information should be related to the carrier signal. There are many different types of
digital watermarking, including traditional watermarking that uses visible media (such as snaps,
images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate
noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital
watermark must be able to withstand changes that can be made to the carrier signal in order to
protect copyright information in media files. The goal of digital watermarking is to ensure the
integrity of data, whereas stegano

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
An Overview of Robust Video Watermarking Techniques
...Show More Authors

     Copyright hacking and piracy have increased as the Internet has grown in popularity and access to multimedia material has increased. Security, property protection, and authentication have all been achieved via watermarking techniques. This paper presents a summary of some recent efforts on video watermarking techniques, with an emphasis on studies from 2018 to 2022, as well as the various approaches, achievements, and attacks utilized as testing measures against these watermarking systems. According to the findings of this study, frequency-domain watermarking techniques are more popular and reliable than spatial domain watermarking approaches. Hybrid DCT and DWT are the two most used techniques and achieve good results in the fi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Image Watermarking using Integer Wavelet Transform and Discrete Cosine Transform
...Show More Authors

In the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.

View Publication Preview PDF
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing digital documents using digital watermarking
...Show More Authors

     The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents.  But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..

In this research LSB  technique  has been used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
ADJUSTING OFF – CENTERING PROCESS FOR A BLOW MOLDED PLASTIC PRODUCT BY USE OF WINQSB SOFTWARE
...Show More Authors

In most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 03 2015
Journal Name
Journal Of Baghdad College Of Dentistry
Periimplantitis-A review
...Show More Authors

Publication Date
Thu Dec 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Periimplantitis- A review
...Show More Authors

This review article concentrates the light about aetiology and treatment of the periimplantitis.

View Publication Preview PDF