Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
CSTGV9M42J
In this paper, we used an image with a gray scale (256 bits) and bmp type. An image can be converted into binary file by using one of filters (Sober, Prewitt, and Robert) to find edges of the original image. Then we input the watermark to prove the authentic and password that used as a key for ciphering the information. This information will embed by using the Vigenere system that will store the cipher information in the edge of the image. As a result invisible watermark is not noticeable to viewer and without any degrade the quality of the content. The product invisible watermark is robust against distortions processes and resistant to intentional tampering solely intended to remove the watermark. Only the person who know the password and watermark and the cipher system, can read the information, we use a visual basic 6.0 program to implement this work.
Dr. Kareem Mohammed Jubor. 2012. \u201cImplementation of Embedding and Extracting Watermarking\u201d. Global Journal of Computer Science and Technology - F: Graphics & Vision GJCST-F Volume 12 (GJCST Volume 12 Issue F14): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 106
Country: Iraq
Subject: Global Journal of Computer Science and Technology - F: Graphics & Vision
Authors: Dr. Kareem Mohammed Jubor (PhD/Dr. count: 1)
View Count (all-time): 245
Total Views (Real + Logic): 9871
Total Downloads (simulated): 2639
Publish Date: 2012 11, Sat
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
In this paper, we used an image with a gray scale (256 bits) and bmp type. An image can be converted into binary file by using one of filters (Sober, Prewitt, and Robert) to find edges of the original image. Then we input the watermark to prove the authentic and password that used as a key for ciphering the information. This information will embed by using the Vigenere system that will store the cipher information in the edge of the image. As a result invisible watermark is not noticeable to viewer and without any degrade the quality of the content. The product invisible watermark is robust against distortions processes and resistant to intentional tampering solely intended to remove the watermark. Only the person who know the password and watermark and the cipher system, can read the information, we use a visual basic 6.0 program to implement this work.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.