The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Theatrical costume constitutes a peculiarity in the theatrical performance because of its ability to communicate and communicate with the rest of the visual elements of the show in highlighting the intellectual and dramatic values. Fashion developments in theatrical performance, the second: the design elements of costumes and their characteristics, the third, which includes research procedures, and the fourth, in which the research results and conclusions were presented, including:
- The play (Happening on the Farm) is considered one of the plays with educational, educational and aesthetic goals, as it carried in its formats the features of simplicity and diversity of the visual formal connotations of the child.
- The c
The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreThis research presents the results of the tests of the physical, chemical and biological treatments performed on the industrial effluent of Al-Rashid Factory for vegetable oils during January to July, 2010. Some environmental parameters such as temperature, electrical conductivity(ec), Biological oxygen demand(bod), chemical oxygen demand(cod), total suspended solids(tss), dissolved oxygen(o2) and total dissolved solids(tdc) have been investigated. The study shows that the industrial effluent contains a percent of organic pollution and in different values, and that it is responsible for the (bod), which records (5.15-67)ppm, while the (cod) ranges between (25-170.5)ppm, the (ec) values range between (
... Show More