"Watermarking" is one method in which digital information is buried in a carrier signal;
the hidden information should be related to the carrier signal. There are many different types of
digital watermarking, including traditional watermarking that uses visible media (such as snaps,
images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate
noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital
watermark must be able to withstand changes that can be made to the carrier signal in order to
protect copyright information in media files. The goal of digital watermarking is to ensure the
integrity of data, whereas steganography focuses on making information undetectable to humans.
Watermarking doesn't alter the original digital image, unlike public-key encryption, but rather
creates a new one with embedded secured aspects for integrity. There are no residual effects of
encryption on decrypted documents. This work focuses on strong digital image watermarking
algorithms for copyright protection purposes. Watermarks of various sorts and uses were
discussed, as well as a review of current watermarking techniques and assaults. The project shows
how to watermark an image in the frequency domain using DCT and DWT, as well as in the spatial
domain using the LSB approach. When it comes to noise and compression, frequency-domain
approaches are far more resilient than LSB. All of these scenarios necessitate the use of the original
picture to remove the watermark. Out of the three, the DWT approach has provided the best results.
We can improve the resilience of our watermark while having little to no extra influence on image
quality by embedding watermarks in these places.
In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreIn this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.
The current research sheds light on an important aspect of the great and rapid development in the field of science and technology and modern manufacturing methods as a result of the scientific revolution resulting from the accelerated cognitive development, which prompted designers in general and interior design in particular to exploit and invest in digital technology and the development of digital control in the process of designing the industrial product for the purpose of creativity and innovation through these digital programs Digital models achieve the requirements and desires of the interior designer according to the creative skill using modern software with high efficiency And extreme accuracy that is consistent with the requirem
... Show MoreIn this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.
Optical spectrum of SN1987A at days 4 from the explosion and its light curve through the first 1444 days after the explosion have been studied. The hydrogen lines present in the spectrum confirms the general characteristics of Type II SN that occur due to core collapse of massive star. Each of the total mass ejected from the explosion and the amount of the total mass of Nickel radioactive isotopes that produced during the explosion as well as the initial velocity of the ejecta and the explosion energy have been determined and compared with different observed and calculated models obtained by different researchers and it’s found that, about 8.8 Mʘ of the progenitor envelope mass had been ejected during the explosion and it’s mixed with
... Show MoreMedia plays an important role in shaping the mental image of their audiences for individuals, groups and organizations, States and peoples. It is the window through which overlooks the masses on events and issues, and in the light of their exposure to these means are their opinions and impressions.
Despite the importance of direct experiences in shaping opinions, drawing pictures and impressions, it is inevitable to rely on these means as individuals can not engage in direct experiences with thousands of events, issues and topics that concern their community and other societies.
There is no doubt that media is of great importance at the present time, because of its significant impact in the management of the course of pol
... Show MoreIn spite of the contemporary development over the world in pertaining of modernization and its differences about the transformation of the knowledge but, the important instrument to transfer the thoughts and information did not have change except the language. So the evolutionary process became as a torrent or fusillade above the cliff which drifted anything. So that the objective inquiry and impressed with varieties of development the casement to evaluate the linguistic or re - correction highlight article in order to preserve on the origins of the language and its sobriety.
Today, we have different correspondence and social media as
<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convol
... Show More<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convol
... Show More