web images
Recently Published Documents


TOTAL DOCUMENTS

198
(FIVE YEARS 18)

H-INDEX

21
(FIVE YEARS 2)

Author(s):  
Muhammad Anshari ◽  
Mahridawati Mahridawati

<p>This study discusses the use of terms related to disability in Arabic. This research aims to see the most popular, dominant, and most widely used terms in Arabic in academic texts and Islamic books. Online data and several references (books, magazines, and others) are the data sources in this study. The term al muʿawwaq/almuʿawwaqīn/i'aqah is the most popular, dominant, and referenced term in terms of persons with disabilities compared to some terms dhawī al iḥtiyājāt al khāssa, al fiʾāt al khāssa, al afrād ghayr al ʿādiyyīn and dhawī al a'hat, this is the result of this research. Each term represents the point of view and perspective used to see the disability issues, the term dhawī al a'hat represents a medical perspective, the term al afrād ghayr al ʿādiyyīn represents a moral perspective, dhawī al iḥtiyājāt al khāssa, and al muʿawaqah represent perspectives social. Terms that represent the social model and individual/medical are more often referred to and used in some terms and are very popular in academic texts, Islamic literature, regulations, and in the digital world such as news, web, images, and Youtube.</p><p><strong>Keywords</strong>: Dhawī al iḥtiyājāt al khāssa, al fiʾāt al khāssa, al afrād ghayr al ʿādiyyīn and dhawī al a'hat</p>


2021 ◽  
Author(s):  
Chuanyi Zhang ◽  
Yazhou Yao ◽  
Xing Xu ◽  
Jie Shao ◽  
Jingkuan Song ◽  
...  

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhifeng Wang ◽  
Chi Zuo ◽  
Chunyan Zeng

Purpose Recently, the double joint photographic experts group (JPEG) compression detection tasks have been paid much more attention in the field of Web image forensics. Although there are several useful methods proposed for double JPEG compression detection when the quantization matrices are different in the primary and secondary compression processes, it is still a difficult problem when the quantization matrices are the same. Moreover, those methods for the different or the same quantization matrices are implemented in independent ways. The paper aims to build a new unified framework for detecting the doubly JPEG compression. Design/methodology/approach First, the Y channel of JPEG images is cut into 8 × 8 nonoverlapping blocks, and two groups of features that characterize the artifacts caused by doubly JPEG compression with the same and the different quantization matrices are extracted on those blocks. Then, the Riemannian manifold learning is applied for dimensionality reduction while preserving the local intrinsic structure of the features. Finally, a deep stack autoencoder network with seven layers is designed to detect the doubly JPEG compression. Findings Experimental results with different quality factors have shown that the proposed approach performs much better than the state-of-the-art approaches. Practical implications To verify the integrity and authenticity of Web images, the research of double JPEG compression detection is increasingly paid more attentions. Originality/value This paper aims to propose a unified framework to detect the double JPEG compression in the scenario whether the quantization matrix is different or not, which means this approach can be applied in more practical Web forensics tasks.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Jin Liu ◽  
Yiwen Zhang

Web page has many redundancies, especially the dynamic html multimedia object. This paper proposes a novel method to employ the commonly used image elements on web pages. Due to the various types of image format and complexity of image contents and their position information, secret message bits could be coded to embed in these complex redundancies. Together with a specific covering code called average run-length-coding, the embedding efficiency could be reduced to  a low level and the resulting capacity outperforms traditional content-based image steganography, which modifies the image data itself and causes a real image quality degradation. Our experiment result demonstrates that the proposed method has limited processing latency and high embedding capacity. What’s more, this method has a low algorithm complexity and less image quality distortion compared with existing steganography methods.


2021 ◽  
pp. 1-1
Author(s):  
Huafeng Liu ◽  
Chuanyi Zhang ◽  
Yazhou Yao ◽  
Xiushen Wei ◽  
Fumin Shen ◽  
...  

2021 ◽  
pp. 1-1
Author(s):  
Chuanyi Zhang ◽  
Qiong Wang ◽  
Guosen Xie ◽  
Qi Wu ◽  
Fumin Shen ◽  
...  

2020 ◽  
Vol 21 (9) ◽  
pp. 1321-1333
Author(s):  
Luo-yang Xue ◽  
Qi-rong Mao ◽  
Xiao-hua Huang ◽  
Jie Chen

Sign in / Sign up

Export Citation Format

Share Document