Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
The Logic of Freezers and Animals in the Holy Quran
The modern textual study researched the textuality of the texts and specified for that seven well-known standards, relying in all of that on the main elements of the text (the speaker, the text, and the recipient). This study was to investigate the textuality of philology, and the jurisprudence of the science of the text.
A developed model has been put for the hypothesis of capturing moons in explaining the origin of Jupiter moons, and study the change of the orbital properties of these satellites as well as the distance from the planet. Jupiter moons were divided into two types according to their physical and orbital properties, they are the moons , which are formed from the same material as the planet, so it was named the original moons ,while the moons that have been captured from the surrounding space was renamed exotic moons . And the moons of exotic origin asteroid belt and the Kuiper belt in the region which is behind Neptune, the origin of each clique of moons is an asteroid fragmented after colliding previously with another body and
... Show MoreThe research aims to identify the digital repository of the University of Baghdad, explain its features, how to register, explaining the mechanism for adding and retrieving research. In addition to identifying the number of people registered in and the number of intellectual outputs stored in it. The descriptive approach and survey methods were adopted by visiting the repository's website and the websites of the University of Baghdad's formations during the period (1-6/4/2024). The theoretical framework included an explanation of the concept of the digital repository, the importance of repositories, their features, and types, with reference to models of Iraqi, Arab, and foreign university digital repositories. The practical framework of the
... Show MorePreserving and saving energy have never been more important, thus the requirement for more effective and efficient heat exchangers has never been more important. However, in order to pave the way for the proposal of a truly efficient technique, there is a need to understand the shortcomings and strengths of various aspects of heat transfer techniques. This review aims to systematically identify these characteristics two of the most popular passive heat transfer techniques: nanofluids and helically coiled tubes. The review indicated that nanoparticles improve thermal conductivity of base fluid and that the nanoparticle size, as well as the concentrations of the nanoparticles plays a major role in the effectiveness of the nanofluids.
... Show MoreDelays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement
Deposits with the Industrial Bank, together with loans received from others, are non-financial financial resources, which are sources of supply to the Industrial Bank of funds that allow the Bank to expand the granting of loans. The increases in this resource indicates that the bank is practicing comprehensive banking, which is consistent with the nature of the transformation of the banking system towards multiple businesses. Therefore, the research comes to highlight the causality of the trend between total deposits and total loans. And if the causality is found, is it one-way or two-way? How long is the impact?