Preferred Language
Articles
/
pBeCMo8BVTCNdQwCq2Al
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security  

Clarivate Crossref
View Publication
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Image Watermarking using Integer Wavelet Transform and Discrete Cosine Transform
...Show More Authors

In the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.

View Publication Preview PDF
Publication Date
Fri Jun 28 2019
Journal Name
Journal Of The College Of Education For Women
The most important ministers of the Abbasid state until the end of the era (198-218 AH)
...Show More Authors

The existence of succession system has appeared in Arab Islamic state after the death of the prophet Mohammed (peace be upon God and peace), So there was caliphate, then the Umayyad dynasty in Syria , until 132 AH , the date o the emergence of the Abbasid state adopted a system ministry formally , hafs bin sulaiman ( Abu salamah Khallal ) was the first  minister emerged on the political scene. He was killed at the time of the first  Abbasid caliph , Abu Albbas , incest 132-136 who had put Khalid bin barmak as a minister instead of Hafs bin Sulaiman . During the reign of AL-Mansur 136-158 , there was an importance and a place for the ministry , despite of AL-Mansur strength personality that covered on his ministers personalities

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
Proposed an Adaptive Bitrate Algorithm based on Measuring Bandwidth and Video Buffer Occupancy for Providing Smoothly Video Streaming
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 26 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Common Fixed Points in Modular Spaces
...Show More Authors

     In this paper,there are   new considerations about the dual of a modular spaces and weak convergence. Two common fixed point theorems for a -non-expansive mapping defined on a star-shaped weakly compact subset are proved,  Here the conditions of affineness, demi-closedness and Opial's property play an active role in the proving our results.

 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Temporal Video Segmentation Using Optical Flow Estimation
...Show More Authors

Shot boundary detection is the process of segmenting a video into basic units known as shots by discovering transition frames between shots. Researches have been conducted to accurately detect the shot boundaries. However, the acceleration of the shot detection process with higher accuracy needs improvement. A new method was introduced in this paper to find out the boundaries of abrupt shots in the video with high accuracy and lower computational cost. The proposed method consists of two stages. First, projection features were used to distinguish non boundary transitions and candidate transitions that may contain abrupt boundary. Only candidate transitions were conserved for next stage. Thus, the speed of shot detection was improved by r

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Quality of Experience Metric of Streaming Video: A survey
...Show More Authors

Technological development in the last years leads to increase the access speed in the internet networks that allow a huge number of users watching videos online.

     Video streaming important type in the real-time video sessions and one of the most popular applications in networking systems.  The Quality of Service (QoS) techniques give us indicate to the effect of multimedia traffic on the network performance, but this techniques do not reflect the user perception. Using QoS and Quality of Experience (QoE) together can give guarantee to the distribution of video content according to video content characteristics and the user experience .

     To measure the users’ perceptio

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Financial markets liquidity and their impact in the return of common stocks
...Show More Authors

    The research aimed to study the financial markets liquidity and returns of common stocks , Take the research  the theoretical concepts  associated with each of the liquidity of financial markets and returns of common stocks , As well as the use of mathematical methods in the practical side to measure market liquidity and Stocks  Return, the community of research in listed companies in Iraqi stock exchange that have been trading on its stock and number 85 joint-stock company, The research was based to one premise, there is a statistically significant effect for the liquidity of the Iraqi stock exchange on returns  of common stocks  to traded companies in which , Using th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (6)
Scopus