Preferred Language
Articles
/
9Bew5I8BVTCNdQwCVn-K
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different resolutions. By considering features from multiple levels, the detection algorithm can better capture both global and local characteristics of the manipulated regions, enhancing the accuracy of forgery detection. To achieve a high accuracy rate, this paper presents a variety of scenarios based on a machine-learning approach. In Copy-Move detection, artifacts and their properties are used as image features and support Vector Machine (SVM) to determine whether an image is tampered with. The dataset is manipulated to train and test each classifier; the target is to learn the discriminative patterns that detect instances of copy-move forgery. Media Integration and Call Center Forgery (MICC-F2000) were utilized in this paper. Experimental evaluations demonstrate the effectiveness of the proposed methodology in detecting copy-move. The implementation phases in the proposed work have produced encouraging outcomes. In the case of the best-implemented scenario involving multiple trials, the detection stage achieved a copy-move accuracy of 97.8 %. 

Crossref
Publication Date
Tue Jul 19 2022
Journal Name
Handbook Of Moth-flame Optimization Algorithm
Moth-Flame Optimization Algorithm, Arithmetic Optimization Algorithm, Aquila Optimizer, Gray Wolf Optimizer, and Sine Cosine Algorithm
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Sep 11 2024
Journal Name
Lecture Notes In Civil Engineering
An Image Processing Algorithm to Address the Problem of Stains Merge on Water Sensitive Papers and Its Impact on the Evaluation of Spray Quality Indicators
...Show More Authors

There are many techniques that can be used to estimate the spray quality traits such as the spray coverage, droplet density, droplet count, and droplet diameter. One of the most common techniques is to use water sensitive papers (WSP) as a spray collector on field conditions and analyzing them using several software. However, possible merger of some droplets could occur after they deposit on WSP, and this could affect the accuracy of the results. In this research, image processing technique was used for better estimation of the spray traits, and to overcome the problem of droplet merger. The droplets were classified as non-merged and merged droplets based on their roundness, then the merged droplets were separated based on the average non-m

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
Simulation and Experimental Walking Pattern Generation for Two Types of Degrees of Freedom Bipedal Locomotion Robot
...Show More Authors

Humanoids or bipedal robots are other kinds of robots that have legs. The balance of humanoids is the general problem in these types when the other in the support phase and the leg in the swing phase. In this work, the walking pattern generation is studied by MATLAB for two types of degrees of freedom, 10 and 17 degrees of freedom. Besides, the KHR-2HV simulation model is used to simulate the experimental results by Webots. Similarly, Arduino and LOBOT LSC microcontrollers are used to program the bipedal robot. After the several methods for programming the bipedal robot by Arduino microcontroller, LOBOT LSC-32 driver model is the better than PCA 96685 Driver-16 channel servo driver for programming the bipedal walking rob

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Mixed Micelles of Binary Mixtures of Sodium Dodecylbenzene Sulfate and Tween 80 Surfactants in Aqueous Solutions
...Show More Authors

In the present work, the surface properties of mixed binary surfactants containing sodium dodecylbenzene sulfate (SDBS) and Tween 80 (TW80) surfactants in aqueous solutions were studied at temperature 293 K using surface tension measurements. The critical micelle concentration (cmc) magnitude for both individual surfactants and their mixtures were established the obtained results revealed  that the magnitude of cmc of the mixtures are less than the magnitude of individual surfactants and decrease with the increase in Tween 80 percent in solution which indicate the nonideal  mixing of the two surfactants. The values of molecular interaction parameters  and the mole fraction of surfactants in the micelle (X1) were calculated

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jul 04 2024
Journal Name
Pharmaceutics
Formulation Development of Meloxicam Binary Ethosomal Hydrogel for Topical Delivery: In Vitro and In Vivo Assessment
...Show More Authors

Abstract: The article aimed to formulate an MLX binary ethosome hydrogel for topical delivery to escalate MLX solubility, facilitate dermal permeation, avoid systemic adverse events, and compare the permeation flux and efficacy with the classical type. MLX ethosomes were prepared using the hot method according to the Box–Behnken experimental design. The formulation was implemented according to 16 design formulas with four center points. Independent variables were (soya lecithin, ethanol, and propylene glycol concentrations) and dependent variables (vesicle size, dispersity index, encapsulation efficiency, and zeta potential). The design suggested the optimized formula (MLX−Ethos−OF) with the highest desirability to perform the

... Show More
Preview PDF
Scopus (11)
Scopus
Publication Date
Fri Aug 27 2021
Journal Name
Journal Of Craniofacial Surgery
The Effects of Local Alendronate With or Without Recombinant Human Bone Morphogenetic Protein 2 on Dental Implant Stability and Marginal Bone Level: A Randomized Controlled Study
...Show More Authors

The aim of this study was to evaluate the effects of local application of bisphosphonate gel and recombinant human bone morphogenic protein 2 gel, on titanium dental implant stability and marginal bone level. Twenty-seven patients with upper and lower missing posterior tooth/teeth were included in the study with a total of 71 implants that were used for rehabilitation. The implants were randomly divided into 4 groups: 3 study groups and 1 control. Group1; local application of bisphosphonate gel, group 2; local application of recombinant human bone morphogenic protein 2 gel, group 3; local application of a mixed formula of both gels. The gel application was immediately preimplant insertion, group 4; implant insertion without application of a

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Medical Image Compression using Wavelet Quadrants of Polynomial Prediction Coding & Bit Plane Slicing
...Show More Authors

Publication Date
Mon Mar 20 2023
Journal Name
2023 International Conference On Information Technology, Applied Mathematics And Statistics (icitams)
Hybrid Color Image Compression Using Signals Decomposition with Lossy and Lossless Coding Schemes
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
Estimation of kidney tumor volume in CT images using medical image segmentation techniques
...Show More Authors

Kidney tumors are of different types having different characteristics and also remain challenging in the field of biomedicine. It becomes very important to detect the tumor and classify it at the early stage so that appropriate treatment can be planned. Accurate estimation of kidney tumor volume is essential for clinical diagnoses and therapeutic decisions related to renal diseases. The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of kidney tumors that addresses the challenges of accurate kidney tumor volume estimation caused by extensive variations in kidney shape, size and orientation across subjects.
In this paper, have tried to implement an automated segmentati

... Show More
View Publication Preview PDF
Crossref