Preferred Language
Articles
/
0BY9mYcBVTCNdQwCllfj
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the center of the block and then store another bit in the write or left bit depended on differences between them. The proposed method was applied to many color images and many measurement terms used to show the efficiency of it. The experiment result showed good result that the PSNR = 53.76, MSE = 0.273, SSIM= 0.999, with embedding rates 0.55.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
Iranian Journal Of Science
Exploring Neimark-Sacker Bifurcation and Chaos Control in a Tri-species Discrete-Time Model
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Mar 20 2023
Journal Name
2023 International Conference On Information Technology, Applied Mathematics And Statistics (icitams)
Hybrid Color Image Compression Using Signals Decomposition with Lossy and Lossless Coding Schemes
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
COMPARATIVE STUDY FOR EDGE DETECTION OF NOISY IMAGE USING SOBEL AND LAPLACE OPERATORS
...Show More Authors

Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
Estimation of kidney tumor volume in CT images using medical image segmentation techniques
...Show More Authors

Kidney tumors are of different types having different characteristics and also remain challenging in the field of biomedicine. It becomes very important to detect the tumor and classify it at the early stage so that appropriate treatment can be planned. Accurate estimation of kidney tumor volume is essential for clinical diagnoses and therapeutic decisions related to renal diseases. The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of kidney tumors that addresses the challenges of accurate kidney tumor volume estimation caused by extensive variations in kidney shape, size and orientation across subjects.
In this paper, have tried to implement an automated segmentati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Medical Image Compression using Wavelet Quadrants of Polynomial Prediction Coding & Bit Plane Slicing
...Show More Authors

Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Object Filling Using Table Based Boundary Tracking
...Show More Authors

The feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Genetic--Based Face Retrieval Using Statistical Features
...Show More Authors

Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Dynamic Capabilities on competitive advantage Analytical research in Iraqi Cement State Company
...Show More Authors

       The current research aims to diagnose the nature of the relation between dynamic capabilities as an independent variable and competitive advantage as a respondent variable, and identify the role of each of them in achieving the required performance of the organizations and adapt to the rapid environmental changes. The research was applied to the Iraqi Cement State Company one of the formations of the Iraqi Ministry of Industry and Minerals, and based on the importance of the subject matter of the research and the importance of the research sample and company of inquiry, The researcher adopted the descriptive analytical method in completing his research. The sample of the research was Intention

... Show More
View Publication Preview PDF
Crossref