Preferred Language
Articles
/
42Fbe5kBdMdGkNqjhScH
Ethnology and globalization of image in cinematographic discourse
...Show More Authors

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem
...Show More Authors

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.

Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Soft Computing And Computer Applications
Enhancing Image Classification Using a Convolutional Neural Network Model
...Show More Authors

In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.

... Show More
View Publication
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors

Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Nov 08 1013
Journal Name
كلية الفنون الجميلة
إشكالية الخطاب الجمالي للجسد في النحت العالمي المعاصر، دراسة على وفق المنهج الظاهراتي
...Show More Authors

اهتم في الربع الأول بالمفاهيم النظرية للمناهج التي تقع في النقاط الخمس ، النقطة الأولى تتعلق بمفهوم الخطاب والخطاب المادي ، وقلنا أن الرسالة كانت مبنية على الجسد من البداية ، حتى قبل ذلك هناك ستكون فلسفة أو معرفة المنظمة. أما النقطة الثانية فتتعلق بالمفهوم الفينومينولوجي للخطاب ، ونحن في هذه المرحلة أهم الركائز التي قام عليها (إدموند هوسرل) في بناء مفهوم وصفي ضعيف. في النقطة الثالثة نكشف عن الظواهر المتعلقة ب

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Mar 05 2026
Journal Name
Al–bahith Al–a'alami
Propaganda speech in the Gulf press articles about the Qatari crisis An analytical study in the political articles published in the newspapers (Riyadh) Saudi Arabia and (Al-Ittihad) UAE from 5/6/2017 to 5/9/2017
...Show More Authors

Propaganda speech in the Gulf press articles about the Qatari crisis, an analytical study in the political articles published in the newspapers (Riyadh) Saudi Arabia and (Al-Ittihad) UAE from 5/6/2017 to 5/9/2017, University of Baghdad, College of Media, Press Department, 2019. The problem of the research was to monitor the contents of propaganda messages to Saudi Arabia and the UAE regarding the Qatari crisis, especially with the escalation of propaganda media campaigns between the four boycotting countries on the one hand and Qatar on the other hand, in light of crises and conflicts in the Gulf region and the Arab region in general. The researcher used the survey method to answer the research questions and achieve its results. This res

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Southwest Jiaotong University
Multi -Focus Image Fusion Based on Stationary Wavelet Transform and PCA on YCBCR Color Space
...Show More Authors

The multi-focus image fusion method can fuse more than one focused image to generate a single image with more accurate description. The purpose of image fusion is to generate one image by combining information from many source images of the same scene. In this paper, a multi-focus image fusion method is proposed with a hybrid pixel level obtained in the spatial and transform domains. The proposed method is implemented on multi-focus source images in YCbCr color space. As the first step two-level stationary wavelet transform was applied on the Y channel of two source images. The fused Y channel is implemented by using many fusion rule techniques. The Cb and Cr channels of the source images are fused using principal component analysis (PCA).

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref