Preferred Language
Articles
/
pBeCMo8BVTCNdQwCq2Al
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security  

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Imam Al-Qushayri was one of the most
...Show More Authors

Eminent figures in Quranic studies in the fourth century of the Hegira, in his
copacity as the founder of the essentials of the indicative approach in interpretation
which is based on the consideration of research principles in interpretation science.
Al-Qushayri participated in clarifying the promotions of this approach in his
works which represent this approach. The mast distinguished of these works is
Tafseer Lataef Al-Isharat. The researcher examined the characteristics of this
approach and its effect on the interpretative movement in Al-Qushayri age an come to
employ them as a practical example for the indicative approach in studying the
interpretation mebods in Islamic sciences.

View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Digital Color Image Watermarking Using Encoded Frequent Mark
...Show More Authors

With the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.

This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
The Immunological Effectiveness of Some Common Plants
...Show More Authors

Three plant species were picked randomly and their alcoholic extracts have been screened to know their effects on the phagocytic capability and intracellular killing of yeast by human peripheral macrophages. Macrophage cultures were incubated with different concentration of each plant extract: for 15 min., 30 min .and 45 min. The phagocytes activity in Iresine herbstii extract was significantly (p?0.05) increased with increasing dose and time of incubation. In Mentha piperita extract, increasing in dose and time of incubation leads to elevate phagocytic capbility, especially in the dose of 20% and 25% of plant extract, perhaps because the antimicrobial and antiviral activities of this plant, as well as strong antioxidant and antitumor act

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Wireless Communications And Mobile Computing
Corrigendum to “Developing a Video Buffer Framework for Video Streaming in Cellular Networks”
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Design and construction of Video extractor
...Show More Authors

Design and construction of video extractor circuit require an understanding of several parameters, which include: Selector circuit, extracting circuit which contains sampling signal and multiplexing. At each radar pulse, the video signal is fed to one of the selector. The fast filter has a pass –band from 190 Hz to 1800 Hz. These frequencies correspond to targets having radial velocities laying between and 10 Kph and 200 Kph.Slow filter: 60 Hz to 230 Hz for radial velocities laying between 3.5 and 13 Kph.The video- extractor is organized in four PCB CG (A-B-C-D) each one having 16 selector. The sampling signal (ADS) (1-2-3-4) control the 4-line-to-16-line decoders. 8 multiplexers of 8 inputs each, are required for the multiplexing of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Fast discrimination of fake video manipulation
...Show More Authors

<span>Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Fri Apr 18 2025
Journal Name
Al–bahith Al–a'alami
The Common Discourse of The Arab tweeters on Normalization
...Show More Authors

The study aimes to analyze the discourse of Arab tweeters regarding the normalization of Arab-Israeli relations on the social media site (Twitter).
Study Methodology: The study relay on the survey method, using the comprehensive survey method, and this research is one of the descriptive types that aim to describe the phenomenon in a qualitative way, and discuss it through the method of in-depth analysis, in addition to using the tools of (discourse analysis).
Study sample: A sample of (8686) tweets for (7425) tweeters, which was posted on Twitter during the period from 15/9 to 30/9/2020, on the issue of normalizing Arab-Israeli relations.
Study tools: The data study was collected using the data mining tool from social networks (

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
J. Appl. Sci
Watermarking based Fresnel transform, wavelet transform, and chaotic sequence
...Show More Authors

Scopus (2)
Scopus
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Common diskcyclic vectors
...Show More Authors

In this paper, we study the common diskcyclic vectors for a path of diskcyclic operators. In particular, if  is a path of diskcyclic operators, we show that under certain conditions the intersection of diskcyclic vectors for theses operators is a dense  set.

View Publication Preview PDF
Crossref