Preferred Language
Articles
/
pBeCMo8BVTCNdQwCq2Al
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security  

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Secured Mechanism Towards Integrity of Digital Images Using DWT, DCT, LSB and Watermarking Integrations
...Show More Authors

"Watermarking" is one method in which digital information is buried in a carrier signal;
the hidden information should be related to the carrier signal. There are many different types of
digital watermarking, including traditional watermarking that uses visible media (such as snaps,
images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate
noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital
watermark must be able to withstand changes that can be made to the carrier signal in order to
protect copyright information in media files. The goal of digital watermarking is to ensure the
integrity of data, whereas stegano

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 26 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Common Fixed Points in Modular Spaces
...Show More Authors

     In this paper,there are   new considerations about the dual of a modular spaces and weak convergence. Two common fixed point theorems for a -non-expansive mapping defined on a star-shaped weakly compact subset are proved,  Here the conditions of affineness, demi-closedness and Opial's property play an active role in the proving our results.

 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jun 28 2019
Journal Name
Journal Of The College Of Education For Women
The most important ministers of the Abbasid state until the end of the era (198-218 AH)
...Show More Authors

The existence of succession system has appeared in Arab Islamic state after the death of the prophet Mohammed (peace be upon God and peace), So there was caliphate, then the Umayyad dynasty in Syria , until 132 AH , the date o the emergence of the Abbasid state adopted a system ministry formally , hafs bin sulaiman ( Abu salamah Khallal ) was the first  minister emerged on the political scene. He was killed at the time of the first  Abbasid caliph , Abu Albbas , incest 132-136 who had put Khalid bin barmak as a minister instead of Hafs bin Sulaiman . During the reign of AL-Mansur 136-158 , there was an importance and a place for the ministry , despite of AL-Mansur strength personality that covered on his ministers personalities

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Financial markets liquidity and their impact in the return of common stocks
...Show More Authors

    The research aimed to study the financial markets liquidity and returns of common stocks , Take the research  the theoretical concepts  associated with each of the liquidity of financial markets and returns of common stocks , As well as the use of mathematical methods in the practical side to measure market liquidity and Stocks  Return, the community of research in listed companies in Iraqi stock exchange that have been trading on its stock and number 85 joint-stock company, The research was based to one premise, there is a statistically significant effect for the liquidity of the Iraqi stock exchange on returns  of common stocks  to traded companies in which , Using th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Fast Temporal Video Segmentation Based on Krawtchouk-Tchebichef Moments
...Show More Authors

View Publication
Scopus (40)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Neurocomputing
A survey on video compression fast block matching algorithms
...Show More Authors

View Publication
Scopus (15)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Bmc Plant Biology
Unravelling the genetic diversity and population structure of common walnut in the Iranian Plateau
...Show More Authors
Abstract<sec> <title>Background

Common walnut (Juglans regia L.) has a long cultivation history, given its highly valuable wood and rich nutritious nuts. The Iranian Plateau has been considered as one of the last glaciation refugia and a centre of origin and domestication for the common walnut. However, a prerequisite to conserve or utilize the genetic resources of J. regia in the plateau is a comprehensive evaluation of the genetic diversity that is conspicuously lacking. In this regard, we used 31 polymorphic simple sequence repeat (SSR) markers to delineate the genetic variation and population stru

... Show More
View Publication
Scopus (18)
Crossref (15)
Scopus Clarivate Crossref