

A Robust Watermarking Technique Using Video Compression Standard H.264 Integer Discrete Cosine Transformation |
Pages: 70-74 (5) | [Full Text] PDF (708 KB) |
A Al-Gindy |
School of Engineering and Technology, AlDar Universiy College, Dubai, UAEDOI: doi.org/10.5281/zenodo.1243196 |
Abstract - This paper presents a robust watermarking algorithm for copyright protection of digital images. The proposed algorithm uses 4*4 block-based integer discrete cosine transformation (intdct) used in the video compression standard h.264. The intDCT is used rather than the conventional DCT. The most significant advantage of this transform is that it is free from any floating-point or fixed-point multiplication required by the original dct and all operations can be carried out with integer arithmetic, without loss of accuracy. The 24 bits/pixel rgb images are used and the watermark is placed on the green channel of the rgb image. Handwritten signature has been used as a watermark and embedded into the host image using different watermarking strengths. Comparison between the DCT and intDCT algorithms is presented. The algorithms performance is evaluated using attack tools. Experimental results show that this proposed algorithm can survive attacks such as jpeg compression, common signal processing attacks, cropping, and scaling. |
Index Terms - Integer dct, Video Compression Standard H.264, Image Watermarking |
C itation - A Al-Gindy. "A Robust Watermarking Technique Using Video Compression Standard H.264 Integer Discrete Cosine Transformation." International Journal of Computer Networks and Communications Security 7, no. 4 (2019): 70-74. |
DATA MINING: Analysis of a Social Data Visualization Web Site (Instagram) |
Pages: 76-78 (3) | [Full Text] PDF (277 KB) |
M Saad, A Mohammad, R Hamri, G Fahad |
College of business administration, Imam Abdurrahman Alfaisal. Saudi Arabia, DammamDOI: doi.org/10.5281/zenodo.1246073 |
Abstract - In the recent years, everyone tends to use social media applications that affect our life and interests. One of the most effective and influence application is Instagram. It is a photo and video sharing that allow people communicate together around the world. Also, it shows people lifestyle in interesting way that why Instagram become most popular social network platform. Instagram draws many of people by showing many different categories such as traveling, food, fashion, and other. This paper seek to analyze some kind of data in Instagram and make it easily when people want to search on it by using two important techniques, which are Rabid Miner and Tableau. Moreover, these data will be filtered based on the most famous account that have highest followers, which are celebrities and make some operator on it. Finally, to conclude these data in better and meaningful way, using visuals and graphs. |
Index Terms - Social, Instagram, Celebrities, Tableau, Rabid Miner, Operator |
C itation - M Saad, A Mohammad, R Hamri, G Fahad. "DATA MINING: Analysis of a Social Data Visualization Web Site (Instagram)." International Journal of Computer Networks and Communications Security 7, no. 4 (2019): 76-78 . |
Effect of the Number of Messages on the Performance of Delay Tolerant Networks for Few Mobility Models |
Pages: 79-82 (4) | [Full Text] PDF (303 KB) |
S Kumar, MA Islam, MF Ahmed |
Lecturer, Department of ICE, Ranpur Engineering College, RangpurAssistant Professor, Department of ICE, University of Rajshahi, RajshahiDOI: doi.org/10.5281/zenodo.1248090 |
Abstract - Delay Tolerant Networks (DTNs) are the class of wireless ad hoc networks used to enable communication in such challenging environment where, usually at any given instance of time, there is a low probability of having a complete path from source to destination. Therefore, DTN is characterized by intermittent connectivity, long or variable delay, asymmetric data rate, and high error rates. In this paper we have investigated the performance of four mobility models, namely Random Direction (RD), Random Walk (RW), Random Waypoint (RWP), and Shortest Path Map Based (SPMB) movement over four different DTN routing protocols namely: Epidemic, PRoPHET, Binary-Spray-And-Wait(B-SNW) and Spray-And-Focus (SNF). We have used Opportunistic Network Environment (ONE) simulator as the simulation tool for evaluating the performance in the opportunistic environment. The performance is analyzed under three performance metrics: Delivery Probability, Overhead Ratio, and Average Latency. From the simulation results, it is observed that the SPMB movement model is the best mobility model for all DTN routing and RW mobility model is the worst mobility model in the considered scenario and setting. |
Index Terms - Delay Tolerant Networks, Opportunistic Network, Shortest Path Map Based Movement Model, Opportunistic Network Environment (ONE) Simulator |
C itation - S Kumar, MA Islam, MF Ahmed. "Effect of the Number of Messages on the Performance of Delay Tolerant Networks for Few Mobility Models ." International Journal of Computer Networks and Communications Security 7, no. 4 (2019): 79-82 . |