The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreCopyright hacking and piracy have increased as the Internet has grown in popularity and access to multimedia material has increased. Security, property protection, and authentication have all been achieved via watermarking techniques. This paper presents a summary of some recent efforts on video watermarking techniques, with an emphasis on studies from 2018 to 2022, as well as the various approaches, achievements, and attacks utilized as testing measures against these watermarking systems. According to the findings of this study, frequency-domain watermarking techniques are more popular and reliable than spatial domain watermarking approaches. Hybrid DCT and DWT are the two most used techniques and achieve good results in the fi
... Show MoreRecent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreBackground: Irritable bowel syndrome (IBS) is one of the most common GI disorders in people under 50 years of age.
Objective: To Formulate an overview about demographics of IBS and patterns of presentation, to determine IBS patients severity ranking, and to recognize the main regimens with their patient satisfaction.
Methods: This is a cross sectional clinical study that is conducted in Outpatient Consultant Internal Medicine Clinic in Al-Kindy Teaching Hospital from 11/12/2017 to 24/12/2017. The patients suffering from IBS are diagnosed by a consultant according to the symptom-based Rome criteria for functional GI disorders, by implementing a questionnaire collecting thorough information. 77 cases of IBS patients were collected (2
The villa was incredible, summer was hot, and the Mediterranean Sea was so near.
Scil lived happily with her father as they needed no one else. But the visit of a calm and intelligent women caused huge shift in this delightful mess. So, how can this threat be stopped?
This novel displays to the reader a rich study of human soul to implicitly while being supported by short sentences and characterised by persons living in a horrible way and described in very short sentences.Thus, Françoise Sagan’s imagination was enflamed, and so he shaped ethical imagery in the moste wonderful way in the novel Hi, Sadness.
Rés
... Show MoreIn this study the Entrance Surface Dose (ESD) received by pediatrics patients undergoing chest, abdomen and skull X-ray examinations was estimated. The study was conducted in two hospitals in Najaf city where three radiographic systems were considered. The study participants were classified into four age groups 0-1 , 1-5 , 5-10 and 10-15 years. Calculations were performed using exposure factors, kVp, mAs and focal-skin distance, together with patient data age. The ESD was calculated for the involved patients who underwent an Antero-posterior (AP) chest, abdomen and skull X-ray examination. The resulted data were analyzed and compared with international dose references. For all studied radiographic examinations and all X-ray mac
... Show MoreThe Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software
... Show More