Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
Recent reports provided evidence that epithelial to mesenchymal transition (EMT) and some matrix metalloproteinases (MMPs) contribute to the invasion and metastasis of cancer cells. This study investigated the expression pattern of some EMT markers (E-cadherin and Vimentin) and some MMPs (MMP-2 and MMP-9) in transitional cell carcinoma (TCC). Fifty five paraffin embedded biopsies were included in this study. Expression pattern of E-cadherin and Vimentin was evaluated by immunohistochemistry while cytoplasmic mRNA expression of both MMP-2 and MMP-9 were determined by in situ hybridization. The expression of all markers were significantly increased with the increase of patient's age (? 50 years), and furthermore an increase in men expression
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreThe relationship between the vision of the scenario and the director is represented in the second search for new mechanisms and possibilities that possess the direct effect and synonyms of the vision of the scenario, so he works on investing them in achieving his ideas and visions with more effectiveness and flexibility to achieve creative potentials, without resorting to the installations and expressive structures themselves that have exhausted their meaning, and lost their luster due to Its prevalence and familiarity on the one hand, and its activation on the other hand to achieve modernity at the level of aromas, after the director takes a method or approach that has privacy and exclusivity, and based on the foregoing, getting
... Show MoreThis research is interested in studying the constant and the variable within the signing reality in Iraqi Kurdistan region, and the researcher tries to tackle the importance of this topic within a search that serves the Kurdish culture, and contribute to its intellectual settlement, and introducing it to centers concerned with studying singing and music science in any civilized environment, whether inside or outside the territory of Kurdistan region. We see that this research which dealt with the topic (the constant and the variable in the Kurdish signing between the past and the present) deserves research and investigation for all its causes, being one of the academic necessities that contribute in identifying the historic artist
... Show More