Preferred Language
Articles
/
BRcvMI8BVTCNdQwC9V9x
Hierarchal Polynomial Coding of Grayscale Lossless Image Compression

Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
Scopus (3)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Audio Hiding in Color Image Using SLT Schemes

As usage of internet grows in different applications around the world, many techniques were developed to guard an important data against from illegal access and modification from unauthorized users by embedding this data into visual media called host media. Audio hiding in an image is a challenge because of the large size of the audio signal. Some previous methods have been presented to reduce the data of the audio signal before embedding it in the cover image, however, these methods was at the cost of reducing the quality of the audio signal. In this paper, a Slantlet transform (SLT) based method is applied to obtain better performance in terms of audio quality. In addition, the data hiding scheme in the cover color image has been imple

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
Adopting Image Integration Techniques to Simulate Satellite Images

Mathematical integration techniques rely on mathematical relationships such as addition, subtraction, division, and subtraction to merge images with different resolutions to achieve the best effect of the merger. In this study, a simulation is adopted to correct the geometric and radiometric distortion of satellite images based on mathematical integration techniques, including Brovey Transform (BT), Color Normalization Transform (CNT), and Multiplicative Model (MM). Also, interpolation methods, namely the nearest neighborhood, Bi-linear, and Bi-cubic were adapted to the images captured by an optical camera. The evaluation of images resulting from the integration process was performed using several types of measures; the first type depend

... Show More
Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Synthetic Aperture Radar Image Classification: a Survey: Survey

In this review paper, several studies and researches were surveyed for assisting future researchers to identify available techniques in the field of classification of Synthetic Aperture Radar (SAR) images. SAR images are becoming increasingly important in a variety of remote sensing applications due to the ability of SAR sensors to operate in all types of weather conditions, including day and night remote sensing for long ranges and coverage areas. Its properties of vast planning, search, rescue, mine detection, and target identification make it very attractive for surveillance and observation missions of Earth resources.  With the increasing popularity and availability of these images, the need for machines has emerged to enhance t

... Show More
Scopus (6)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation Optimal Threshold Value for Image Edge Detection

      A new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2024
Journal Name
Al-mustansiriyah Journal Of Science
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes On Data Engineering And Communications Technologies
Scopus Crossref
View Publication
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Studying Of Image Intensity Distribution Of Elliptical Object (Elliptical Spread Function)

      In this work, a new formula of intensity distribution in image plane of elliptical object was founded (Elliptical spread function), by using optical system including circular aperture. The Gauss quadrature method of numerical integral was used for calculating equation's integrals. Curves are shown for system having focal error and intensity distribution in focal axis.  

View Publication Preview PDF