Preferred Language
Articles
/
pBeCMo8BVTCNdQwCq2Al
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security  

Clarivate Crossref
View Publication
Publication Date
Tue May 16 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Watermarking in Medical Image
...Show More Authors

Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Nation-Building in The Fragile States: Iraq After 2003 as a Model
...Show More Authors

The nation-building process in fragile states is complex, often involving multifaceted challenges and opportunities. A pertinent example is Iraq post-2003, which serves as a model to study the intricacies of rebuilding a nation in the aftermath of conflict. During this period, we witnessed a significant international intervention aimed at establishing democratic governance, fostering economic development, and restoring social stability. Iraq’s nation-building journey showcases both successes and shortcomings. Establishing a representative government marked a step towards inclusivity and political participation, yet sectarian tensions persisted, hindering cohesive national identity. Economic initiatives aimed to harness Iraq's oil resou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 07 2025
Journal Name
Al–bahith Al–a'alami
Challenges Faced by the Media under the Fragile State: Analytical Study of the Iraqi Media Reality
...Show More Authors

This study aims at defining the concept of the fragile state, a term that came into existence in 2014, when the states that had internal Problems and external interventions were referred to as the failure states. However, the indicators for their designation and the criteria adopted are 12 indicators that address all aspects of the State’s duties vis-a-vis its citizens. The study examined the reasons that led to the continuation of Iraq within the fragile states, and the selection of the five years within the time limits of the study due to the factors that led to the decline of Iraq and falling back within the most fragile countries. The study dealt with the fragile state challenges to the media reality as a result of the change of it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Watermarking for Mobile Device
...Show More Authors

The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore,  the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of  the mobile network and its wide usage through  different types  of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Imam Al-Qushayri was one of the most
...Show More Authors

Eminent figures in Quranic studies in the fourth century of the Hegira, in his
copacity as the founder of the essentials of the indicative approach in interpretation
which is based on the consideration of research principles in interpretation science.
Al-Qushayri participated in clarifying the promotions of this approach in his
works which represent this approach. The mast distinguished of these works is
Tafseer Lataef Al-Isharat. The researcher examined the characteristics of this
approach and its effect on the interpretative movement in Al-Qushayri age an come to
employ them as a practical example for the indicative approach in studying the
interpretation mebods in Islamic sciences.

View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
The Video effect on Youths Value
...Show More Authors

The Video effect on Youths Value

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Internet And Distributed Computing Systems
A Proposed Adaptive Rate Algorithm to Administrate the Video Buffer Occupancy for Smooth Video Streaming
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing digital documents using digital watermarking
...Show More Authors

     The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents.  But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..

In this research LSB  technique  has been used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 26 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Video Copyright Protection
...Show More Authors

Illegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
The Immunological Effectiveness of Some Common Plants
...Show More Authors

Three plant species were picked randomly and their alcoholic extracts have been screened to know their effects on the phagocytic capability and intracellular killing of yeast by human peripheral macrophages. Macrophage cultures were incubated with different concentration of each plant extract: for 15 min., 30 min .and 45 min. The phagocytes activity in Iresine herbstii extract was significantly (p?0.05) increased with increasing dose and time of incubation. In Mentha piperita extract, increasing in dose and time of incubation leads to elevate phagocytic capbility, especially in the dose of 20% and 25% of plant extract, perhaps because the antimicrobial and antiviral activities of this plant, as well as strong antioxidant and antitumor act

... Show More
View Publication Preview PDF
Crossref