Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various attacks.
The problem of research was to identify after the use of cost technology based on specifications in the validity of determining and measuring the costs of the implementation of contracting, by applying to al-Mansour General Construction Contracting Company as an appropriate alternative to the traditional costing system currently adopted, which is characterized by many shortcomings and weaknesses Which has been reflected in the validity and integrity of the calculations. To solve this problem, the research was based on the premise that: (The application of cost technology based on specifications will result in calculating the cost of the product according to the specification required by the customer, to meet his wishes properly and witho
... Show MoreThe job that confronts players with the effectiveness of shooting with an air rifle is high, so it requires necessary functional adaptations that differ in their degrees from other sports. Regular training in air rifle shooting leads to physiological changes in most of the body's internal systems, and changes and responses can be identified. The functional accompanying physical activity through the presence of body components that reflect these physiological changes in the form of changes in some components, and the importance of research lies in studying the physiological changes accompanying the maximum physical effort and the consequent development of the level of achievement in the effectiveness of shooting with air rifle and body
... Show MoreThe article describes a study on the role of vitamin C as a protective agent for the teeth, gum, and implants using quantum chemical calculations and polarization tests. The Density Functional Theory (DFT) at 6-311G (d, p) basis set is used to estimate the ability of vitamin C to inhibit the corrosion of the abovementioned parts. The experimental study was performed in a at human body media simulator (Hank’s balanced salt solution) at a temperature of 37°C. The compound was optimized for its ground state, physical properties, and corrosion parameters. Further, HOMO, LUMO, energy gap, dipole moment, and other parameters were used to predict the inhibitor’s efficiency. Gaussian 09, UCA-FUKUI, MGL tools, DSV, and LigPlus software was used
... Show MoreThis work includes the geographical distribution variation and notes for the habitat of Iraqi blind snakes Leptotyphlops macrorhynehus. Typhlops braminus, and Typhlops vermicularis. A key was also given for the identification of these three snakes.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreBuilding natural period, T, is a key character in building response for wind and seismic induced forces. In design practice, the period, T, is either estimated from empirical relations proposed by the design codes or determined from analytical or numerical models. The effect of the soil-structure interaction is usually neglected in the design practice and analysis models. This paper uses a sophisticated finite element simulation to investigate the effect of soil-structure modeling on the fundamental period of RC buildings subjected to wind and seismic induced forces. A typical interior building frame has been imitated using the frame element for beams and columns with constrains to mo
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
KE Sharquie, AA Noaimi, SA Galib, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 4
The current study deals with one of the ancient and modern techniques of ceramic art, which has evolved dramatically. This technique is interested in the muddy Body and its coloring, rather than interesting in the coloring of the layer on the surface of the glass port on the ceramic object. It is classified as ceramic techniques of the single heartburn, where use many coloring oxides. As well as, the use of (Pigment), which is often made of metal compounds, or metal oxides such as iron and manganese, copper and cobalt and more others.
The first chapter includes the problem, the importance, the goal, and the boundaries of the study. In addition, focuses on determining the terms such as (Sgrafitto). The second chapter consists of two to