Preferred Language
Articles
/
oRd_Mo8BVTCNdQwClGC7
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.

Scopus Crossref
View Publication
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Application Tools Lean Six Sigma Definition and measurement phases in new product development. In the Electrical Industries State Company. case Study.
...Show More Authors

methodology six sigma Help  to reduce defects by solving problems effectively, and works Lean to reduce losses through the flow of the manufacturing process and when integrating these two methodologies (Lean and six sigma), the methodology of Lean six sigma will form the entrance to the organizers of the optimization process and increase the quality and reduce lead times and costs . by focusing on the needs of the customer. this process uses statistical tools and techniques to analyze and improve processes.

 We have conducted this research in the General Company for Electrical Industries and adopted its product (machine cooling water three taps) as a sample for research. In order to determine t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Financial performance evaluation using some indicators of value creation (Analytical study of selected sample of Iraqi banks)
...Show More Authors

The research of three-based financial indicators to create value for shareholders, have been identified research problem in a number of the questions revolved around the extent to which it can express its based performance metrics to create value for the essence and the reality of the surveyed enterprises performance, Can the departments surveyed companies to choose the scale or the most harmonizing index and an expression of the actual performance of the company, has the goal of research is to diagnose the strengths and weaknesses in the performance of the surveyed enterprises through the use of a number of based on the concept of creating economic value and the search for the most suitable indicator to the reality of the perfor

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
The term that is verbally agreed and different is meaningful Between grammar and fundamentalists
...Show More Authors

Science is linked to each other bonds assets, branches and even close to each other; to become a link of this type of patterns of scientific integration, and perhaps the most prominent science that saw the overlap and interdependence of science and jurisprudence and its origins, and this interdependence did not stop at the epistemological foundations of knowledge; To the branches, methods of extraction, and diligence to extend to the terminology; to find similar terms in both flags; to become those terms similar in the word and meaning and even the end, but we do not lack terms similar in pronunciation and differing in meaning; and this difference is imposed by the specificity of each science and what M E; however, approached many terms

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Research In Dental And Maxillofacial Sciences
Relationship between Third Molar Impaction and Extraction, and Awareness about the Associated Potential Risks
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
Structural and contextual dimensions of the coming   Intervals Between that diluted and her experience
...Show More Authors

In the name of of Allah the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the Seal of the Prophets and Messengers. The envoy is a mercy to the worlds Muhammad Sadiq Al - Amin, and to the pure and good companions of the Tayyibites.
The formula of the morphological formulas, which have diverged from other meanings, whether lexicon or contextual and what this formula contains many meanings (effective source) and (effective in the sense of effective) and (effective sense reactor) and (effective sense) and ( (F) in the sense of a similar character) and ((the name of the) (collect). This was dealt with in the formula in Surat al-Nisaa a gramophone study. As mentioned in the study of the morphological subj

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Illiteracy and its Impact on the Reality of Iraqi Youth between Heritage and Contemporary
...Show More Authors

Illiteracy has spread in the last years, although it was eliminated in the 1980s. The return of illiteracy brings ignorance, illness, backwardness and regression among nations. It has taken many types, mainly alphabetical, scientific and computer illiteracy. Hence, the increasing nature of illiteracy has attracted the attention of governments and societies alike. This may touch the reality of societies starting with their youth unless those, who are in charge, will find workable solutions for the existing problems. The results of the study revealed that there is a real disaster awaiting the next generation after years of stray, and ignorance of the people in charge who are too engaged in getting their privileges to care about this proble

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Places between vanishing and appearing compass and sense in the Iraqi Kurdish poetry translator
...Show More Authors

Longer Kurdish poetry translator important tributary of the tributaries of the Iraqi culture contemporary , and a wealth of knowledge rich experiences of an important segment of the Iraqi people , nicked culturally with the languages and cultures of the neighboring nations have , however, much of this potery under depends on the effect of the Arab form and complex , but suffered marginalization and loss as a result of repression by the governments of the country by successive throughout history , and tried to search that offers a vision on the theme of the place and its implications in the Kurdish poetry translator, through the election of a collection of poems and chisels, vertical than that of quantum poetic enormous , but thenature of

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
International Journal Of Technology
Impact of Lambda Value on Combustion Characteristics and Emissions of Syngas-Diesel Dual-Fuel Engine
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication