Browsing by Author "Aljadir, Taha"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Conference Object Citation Count: ALjadir, Taha; MohyALdeen, Omar; Abdalrahman, Mouath, "Comparison Between Embedding On Edges in Spatial and Frequency Domains", Fifth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 318-323, (2015).Comparison Between Embedding On Edges in Spatial and Frequency Domains(IEEE, 2015) Aljadir, Taha; MohyALdeen, Omar; Abdalrahman, MouathPractically, digital watermarking is considered as an advanced field of investigating to avoid unauthorized copying and duplication. In this paper, a comparative analysis is conducted among embedding the watermark on the edges of a cover image in two domains, spatial and frequency domains. In this work, the Sobel edge detection algorithm is used to find edges and embed the watermark on the edge in each domain using DWT and DCT. Results demonstrated that the embedding process in frequency domain is more accurate and effective than it in spatial domain. Furthermore, the use of the four bands of frequency in DWT makes embedding on edge algorithm stronger and more robust with low MSE rates averagely.Master Thesis Citation Count: ALJADİR, T. (2015). Measurement of system security issues of private computer networks for different types of attacks. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Measurement of system security issues of private computer networks for different types of attacks(2015) Aljadir, TahaIn this thesis, two different types of Remote Access Virtual Private Network protocols (PPTP and SSL) have been established virtually using Virtual Lab. In addition, different types of security attacks have been applied to each protocol under the same conditions. For each attack, different tools were applied separately to each protocol. Moreover, the attacks were used to target different components for each VPN. The results were studied carefully, which led to obtaining a good security analysis used later to compare between those protocols under the test conditions and to give recommendations to use each of those protocols