Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
Contemporary life is racing against time in its temptations and variables, and it has become shaped and changed in an amazing way in its various aspects and fields. This was facilitated by intellectual and scientific communication between civilizations, and the rapid progression in successive inventions and discoveries in the fields of science and arts of knowledge. This contributed to a great economic and commercial renaissance. Then, these economic developments entered the world into a very strong competition, which forced producers to calculate all production costs, to reach the highest profits by reducing the price of the produced commodity on the one hand, and achieving quality in appearance (especially) on the other hand. Since the ma
... Show MoreIn our time, not too long ago, the universities of the world have been fast to take care of the study of an innovative type of technical and human studies, called the science of "comparative literature". Comparative research studies have grown and flourished rapidly in response to the demands of both mental and artistic life. This shows the increasing awareness at both the modern national and the international levels in order to develop through connecting with the international intellectual, nental and artistic currents to nurture ethics and originality. Comparative studies show that the beginning of the comparative literature goes back to the time when the Latin literature was connected to the Greek literature and th
... Show MoreASTRACT
The current study aimed to identify the quality of health services provided by the Omani health sector through the comparison between public and private hospitals in Dhofar Governorate, Oman. A questionnaire has been developed to collect data from 360 patients who received health services in one public Hospital (Sultan Qaboos) and three private Hospitals (Badr Al-Sama, Lifeline, and Al-Hakeeim). The data were analyzed using independent samples T-Test and One Way ANOVA. The results of the study showed that the quality levels of health services offered in private hospitals were better than public hospitals. The study results also reveled that there are significant differences between public hospitals and private hos
... Show MoreThrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic
... Show MoreIn this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
Samples of the ovary and uterus of local breed cats used to investigate the histological, histometrical and hormonal features. The paraffin embedding technique was used for processing of tissue that stained by hematoxyline and eosin stain, and massons trichrom stain. Ovary of at proestrus or oestrus phases composed of outer cortex that covered by cuboidal germinal epithelium and inner medulla. Tunica albuginea composed of a thin layer of characterized by fusiform stromal cells. The cortex content groups of Oogonial cells, numerous primordial follicles, little primary, secondary and tertiary follicles in addition for 1-2 follicular cysts and mature corpus letium. In pregnant cat the thickness of ovarian cortex was significantly incre
... Show MoreNever the less, banking compliance function became one of the most important functions in banking sector according to its characteristics that considered as an interior control tools to control (executive management, departments, subsidiaries…etc) in any bank; and their compliance towards applying rules, recommendations and legislations. In addition to, estimating the risks and limited them; and controlling the anti-money laundering. Thus, these functions that covered the main concept of (Banking Compliance) would avoid the bank to be under the control of any sanctions.