3. زمنيا الدراسات رتبTimeline of the literature
وتحسن وتطور ،األفكار ،النظريات على بناء الدراسات رتب
النتائج
Follow the chorological order الزمني الترتيب اتبع
20152000 2005 20202010
انتق ثم دراسة لكل الرئيسية النتائج وسجل وحلل الحظد
بناء موضوعي بشكل
4. Based on Li et al. (2013) experiments, it can be concluded
that the watermarking technique based on HVS model in
DWT domain can be a better balance of the conflict
between robustness and perceptibility.
انتق ثم دراسة لكل الرئيسية النتائج وسجل وحلل الحظد
بناء موضوعي بشكل
According to a report by Cisco [1], by 2021, global IP
traffic will reach 3.3 ZB and online video will be
responsible for 82% of this traffic.
The HVS models in watermarking were suggested to
improve the robustness and imperceptibility (Reddy and
Varadarajan, 2010, Preda and Vizireanu, 2011) in the same
time.
10. REFERENCES & EXAMPLES
كأمثلة المستخدمة المراجع
1. Hu, Y., & Bai, G. (2014). A systematic literature review of cloud computing in
eHealth. arXiv preprint arXiv:1412.2494.
2. Alfagi, A. S., Manaf, A. A., Hamida, B. A., & Hamza, M. G. (2017). A Systematic
Literature Review on Necessity, Challenges, Applications and Attacks of
Watermarking Relational Database. Journal of Telecommunication, Electronic and
Computer Engineering (JTEC), 9(1-3), 101-108.
3. Kaur, R., Chana, I., & Bhattacharya, J. (2018). Data deduplication techniques for
efficient cloud storage management: a systematic review. The Journal of
Supercomputing, 74(5), 2035-2085.