{"title":"An NGram-Based Copyright Protection for Digital Images","authors":"A. Sleit, Adel Abusitta","doi":"10.54938/ijemdcsai.2022.01.1.33","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.33","url":null,"abstract":"This paper introduces an NGram-based approach for digital images copyright protection. The advantage of the proposed approach compared to the existing works, is that it does not always require the whole elements (e.g., bits) of the watermark pattern to be embedded into the original digital image. This, in turn, allows us to protect the digital images while at the same time minimizing the chances of having low quality marked digital images. The best case occurs when no element of the pattern is embedded into the original digital image. In contrast, the worst case, which rarely happens, occurs when all elements are embedded into the digital image. Moreover, the use of an NGram approach allows us to efficiently and easily reach any part of the image using the corresponding level numbers and addresses. This makes it more efficient especially for complex and high-dimensional data (e.g., images and videos). Experimental results show the effectiveness of the proposed approach in terms of the ability to recover the watermark pattern from the marked digital image even if major changes are applied to the original digital image.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122617968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring Education Quality in E-Learning using the 4th Industrial Revolution Framework ROFSET","authors":"H. Ahmed, Shameer Shahzad","doi":"10.54938/ijemdcsai.2022.01.1.79","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.79","url":null,"abstract":"The impact that elearning has created over the last two decades has been revolutionary. It provides both an asynchronous and synchronous teaching environment that can be accessed by students around the world from urban to rural regions. There is no need for the student to physically travel to faraway places to seek quality education. With eLearning, students can learn from the best teachers while being in their homes. This provides tremendous opportunities to students in terms of affordability, and convenience. It is envisaged that elearning will continue to grow rapidly as the platform of choice. Unfortunately, elearning education is not widely accepted as a proper degree by many institutions and companies worldwide. There are good reasons for this unacceptability as mentioned below.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123505461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Subair, Derar Yosif, A. Ahmed, Christopher Thron
{"title":"Cyber Crime Forensics","authors":"S. Subair, Derar Yosif, A. Ahmed, Christopher Thron","doi":"10.54938/ijemdcsai.2022.01.1.37","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.37","url":null,"abstract":"Cyber crime is becoming more frequent in our daily life since computers are everywhere now and hence the term cyberspace is becoming our ordinary life. Digital forensics or computer forensics which the process of securing digital evidence against the crime is becoming inevitable. Digital evidence is the foundation for any digital forensic investigation that can be collected by several means using technologies and scientific crime scene investigation. Modifications with crime scene data may possibly change the evidences that may lead to different investigation results. Several models and frameworks to help investigating cybercrimes have been proposed. In this paper we are proposing a frame work that to suit the Sudanese judiciary system. The framework suggested studied several models and frameworks in the globe to come out with a suitable framework model that can help the Sudanese courts taking their decisions concerning cybercrime. The conventional chain of custody is our main platform to construct our framework. That is due to fact that computer crime is different from conventional crime in that it may have no definite place or space. Although The share of people in computer crime is more crucial than the technology itself, achieving evidence integrity is more challenging than normal crimes. This work aims to study and evaluate the applicability of existing digital forensic process models to the Sudanese environment, analyze each of these frameworks might and then construct a framework to Sudan courts.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114714215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}