Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
Autorías: Mustafa Abdulamir Hussain, Ahmed Sebeaatea Almujamay, Riyadh khaleel khammas. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 5, 2022. Artículo de Revista en Dialnet.
The purpose of this study is to examine the moderating role of business environment on the relationship between Entrepreneurial Skills (ES) and business performance of Small Business (SB) in Iraq, Baghdad. This study aims to resolve the inconsistencies found in the contemporary literature regarding the relationship between ES and business performance. Questionnaire using a 5-point Likert scale was adopted from previous work to ascertain the responses of the respondents. Survey research design was adopted, and self-administered questionnaires were used to collect the data from small business owners in 9 districts in Baghdad the capital of Iraq. The analysis was conducted using SPSS version 23.0. The direct relationship and hierarchical regre
... Show Moreكان المؤتمر الآسيوي الأفريقي الأول الذي عُقد في مدينة باندونغ الاندونيسية عام 1955 هو المؤتمر هو الأول الذي اجتمعت فيه الدول الآسيوية والأفريقية بعد الحرب العالمية الثانية. كان مؤتمر باندونغ بمثابة نقطة الانطلاق نحو تأسيس حركة عدم الانحياز، والتي كانت مصر أحد أبرز أقطابها. شهد المؤتمر تقاربا في الآراء ووجهات النظر بين جمهورية مصر العربية وجمهورية الصين الشعبية، لا سيّما وإن الحكومة المصرية كانت قد تبنت س
... Show MoreThis study has been carried out to evaluate the expression level of beta 2 microglobulin gene on patients infected by hepatitis C virus before and after treatment with interferon. The study included 117 hepatitis C patients comprising as 63 pre-treated patients, the range of age was between 20-65 year with a mean age of 48.12 ± 16.1 and 54 post-treated patients with age range was between 23-63 year with the mean of 46.1 ± 18.1. Also it was found that more than half of patients were located within third and fourth decade i.e. 30-49 year, with a percentage of 52.4% and 55.6 % for pre-treatment and post-treatment patients respectively. Moreover , regarding both groups, males are more than females with the ratio of ( 3.2:1) among p
... Show MoreBackground: The formation of white spot lesions around fixed orthodontic attachments is a common complication during and after fixed orthodontic treatment, which hinders the result of a successfully completed orthodontic treatment. The aim of the study was to assess the effectiveness of the Caries Infiltrant (ICON®) on prevention of caries on the smooth enamel surface when applied alone or combined with conventional adhesives. Materials and methods: Seventy eight human premolar enamel discs were randomly assigned to six groups (n=13). The discs were etched and treated with resins of different monomer content forming the following groups: (1)Untreated etched samples served as the negative control, (2) ICON® (DMG), (3) Adper™ S
... Show MoreThis paper presents the effect of Cr doping on the optical and structural properties of TiO2 films synthesized by sol-gel and deposited by the dip- coating technique. The characteristics of pure and Cr-doped TiO2 were studied by absorption and X-ray diffraction measurement. The spectrum of UV absorption of TiO2 chromium concentrations indicates a red shift; therefore, the energy gap decreases with increased doping. The minimum value of energy gap (2.5 eV) is found at concentration of 4 %. XRD measurements show that the anatase phase is shown for all thin films. Surface morphology measurement by atomic force microscope (AFM) showed that the roughness of thin films decrease with doping and has a minimum value with 4 wt % doping ratio.
Cadmium sulfide (CdS) nanocrystalline thin films have been prepared by chemical bath deposition (CBD) technique on commercial glass substrates at 70ºC temperature. Cadmium chloride (CdCl2) as a source of cadmium (Cd), thiourea (CS(NH2)2) as a source of sulfur and ammonia solution (NH4OH) were added to maintain the pH value of the solution at 10. The characterization of thin films was carried out through the structural and optical properties by X-ray diffraction (XRD) and UV-VIS spectroscopy. A UV-VIS optical spectroscopy study was carried out to determine the band gap of the nanocrystalline CdS thin film and it showed a blue shift with respect to the bulk value (from 3.9 - 2.4eV). In present w
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreSewer sediment deposition is an important aspect as it relates to several operational and environmental problems. It concerns municipalities as it affects the sewer system and contributes to sewer failure which has a catastrophic effect if happened in trunks or interceptors. Sewer rehabilitation is a costly process and complex in terms of choosing the method of rehabilitation and individual sewers to be rehabilitated. For such a complex process, inspection techniques assist in the decision-making process; though, it may add to the total expenditure of the project as it requires special tools and trained personnel. For developing countries, Inspection could prohibit the rehabilitation proceeds. In this study, the researchers propos
... Show More