The secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in
... Show MoreIn this article, the boundary value problem of convection propagation through the permeable fin in a natural convection environment is solved by the Haar wavelet collocation method (HWCM). We also compare the solutions with the application of a semi-analytical method , namely the Temimi and Ansari (TAM), that is characterized by accuracy and efficiency.The proposed method is also characterized by simplicity and efficiency. The possibility of applying the proposed method to many types of linear or nonlinear ordinary and partial differential equations.
In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that
The technique of integrate complimentary details from two or more input images is known as image fusion. The fusion image is more informational and will be complete more than any of the original input images. This paper Illustrates implementation and evaluation of fusion techniques used on the Satellite images a high-resolution Panchromatic (Pan) and Multispectral (MS). A new algorithm is proposed to fuse a Pan and MS of the lowresolution images based on combining IHS and Haar wavelet transform.Firstly, this paper clarifies the classical fusion by using IHS transform and Haar wavelet transform individually. Secondly proposition new strategy of combining the two methods. Performance of the proposed method is evalua
... Show MoreWe explore the transform coefficients of fractal and exploit new method to improve the compression capabilities of these schemes. In most of the standard encoder/ decoder systems the quantization/ de-quantization managed as a separate step, here we introduce new way (method) to work (managed) simultaneously. Additional compression is achieved by this method with high image quality as you will see later.
One major problem facing some environments, such as insurance companies and government institutions, is when a massive amount of documents has to be processed every day. Thus, an automatic stamp recognition system is necessary. The extraction and recognition of a general stamp is not a simple task because it may have various shapes, sizes, backgrounds, patterns, and colors. Moreover, the stamp can be printed on documents with bad quality and rotation with various angles. Our proposed method presents a new approach for the preprocessing and recognition of color stamp images. It consists of four stages, which are stamp extraction, preprocessing, feature extraction, and matching. Stamp extraction is achieved to isol
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.
In this paper, membrane-based computing image segmentation, both region-based and edge-based, is proposed for medical images that involve two types of neighborhood relations between pixels. These neighborhood relations—namely, 4-adjacency and 8-adjacency of a membrane computing approach—construct a family of tissue-like P systems for segmenting actual 2D medical images in a constant number of steps; the two types of adjacency were compared using different hardware platforms. The process involves the generation of membrane-based segmentation rules for 2D medical images. The rules are written in the P-Lingua format and appended to the input image for visualization. The findings show that the neighborhood relations between pixels o
... Show MoreIn this paper a method to determine whether an image is forged (spliced) or not is presented. The proposed method is based on a classification model to determine the authenticity of a tested image. Image splicing causes many sharp edges (high frequencies) and discontinuities to appear in the spliced image. Capturing these high frequencies in the wavelet domain rather than in the spatial domain is investigated in this paper. Correlation between high-frequency sub-bands coefficients of Discrete Wavelet Transform (DWT) is also described using co-occurrence matrix. This matrix was an input feature vector to a classifier. The best accuracy of 92.79% and 94.56% on Casia v1.0 and Casia v2.0 datasets respectively was achieved. This pe
... Show More