Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Dujan B. Taha"'
Publikováno v:
Advances in Multimedia, Vol 2022 (2022)
The importance of digital image authentication has grown in the last decade particularly with the widespread availability of digital media and image manipulation tools. As a result, different techniques were developed to detect fraudulent alterations
Externí odkaz:
https://doaj.org/article/0fe0cf872d87431fb4b2528974d27ede
Autor:
Shahad J. Ahmed, Dujan B. Taha
Publikováno v:
2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM).
Autor:
Saja J. Mohammed, Dujan B. Taha
Publikováno v:
2022 International Conference on Computer Science and Software Engineering (CSASE).
Autor:
Dujan B. Taha, Saja J. Mohammed
“Cloud computing” is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41590c0181d7b9ef8270b98fd5c98dd2
https://zenodo.org/record/5881029
https://zenodo.org/record/5881029
Image watermarking algorithms can be implemented using time domain or frequency domain-based algorithms. Frequency domain watermarking produces watermarks with higher robustness; hence, many attempts have been proposed in literature using different t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5f92ffacfbbe4a03c60d98e1c2de6328
https://zenodo.org/record/4475458
https://zenodo.org/record/4475458
Publikováno v:
TELKOMNIKA (Telecommunication Computing Electronics and Control). 19:1507
Software design is one of the very important phases of the software engineering. The costs of software can be minimized if improvements or corrections made during this stage. Several of the current computer aided software engineering (CASE) tools lik
Publikováno v:
Journal of Physics: Conference Series. 1962:012021
Recently, with the wide distribution of digital media, the need for authenticating digital images was increased. Therefore, many image tamper detection and recovery algorithms were introduced in literature to detect malicious modifications and retrie
Autor:
Saja J. Mohammed, Dujan B. Taha
Publikováno v:
Journal of Physics: Conference Series. 1963:012154
A big challenge in privacy-preserving is found when trying is to share data while protecting the information of personally identifiable, such as phone numbers, email addresses, and biometric. The same challenges have appeared when keeping sensitive d
Autor:
Dujan B. Taha, Taha B. Taha
Publikováno v:
2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE).
To evaluate the watermarking algorithm performance, one of the basic factors used for this purpose is the watermark imperceptibility, which reflects the degradation of watermarked image in compare to the original image. In this paper, the performance
Autor:
Dujan B. Taha, Asmaa Thanoon
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 11, Iss 2, Pp 73-87 (2014)
Documentation process plays a great role in software systems development and maintenance, and regarded as an important feature for all software projects and programs in general. In the past, documents had been generated manually by documents writers,