The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Fever is a common illness in the pediatric age group ,the causes could be viral ,bacterial and fungal , this study was focused on bacterial pathogens as gram positive like Staphylococci, coagulase positive or negative ,Streptococci and gram negative like E-coli , Klebsialla ,Proteus, Pseudomonas, Burkhoderia , Acinetobacter and others like Pusturella ,E-alkalescendiaper, Haemophillus influenza and yeast like candida . Four thousand and seventy eight blood samples (4078)were collected in a period between January 2011 and the end of May 2012 at the child welfare hospital ,all the samples were cultured on suitable culture media and then biochemical tests were done using API-E 20 and sugar fermentation tests ,sensitivity
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreThis research is a new reading of some of the words in the Holy Quran, which is very old. It is a human reading in which religions are intertwined by recognizing the relationship between man and his fellow man in the unity of existence and the unity of the source of religions and the unity of language. The importance of this research in comparing some of the Arabic words has been contained among books believed by followers that it is from the one God Sunday.
When words are spoken in one way in the form of one creature, from the beginning of creation to the present day, this indicates the single origin of the languages..
The research tools were books of heavenly religions, the Quran, dictionaries and interpretations.
... Show MoreReceipt date:10/27/2021 accepted date:12/15/2021 Publication date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremi
... Show MoreCitrus fruits are one of the consumer agricultural products of the Iraqi citizen. It is rich in vitamins and usedin many food industries as well as medicines. Classifying the amount of production of citrus treesaccording to the producing governorates has been done to find a map that shows the production of citrustrees according to Iraqi governorates. A cluster analysis method was used according to the hierarchicalmethod. The results showed that Najaf and Qadisiyah are the most similar in citrus production, whileSaladin and Najaf were the two governorates with the furthest distance in proximity matrix. Diyalagovernorate was clustered in the first cluster within two, three, four or five of the clusters for classifyingIraqi governorates covere
... Show More