Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to deception by morphed images. Finally, morph detection and classification are conducted using the proposed SNN framework, which incorporates a novel feature fusion strategy based on Canonical Correlation Analysis (CCA) to enhance discriminative power. The model is trained and evaluated using publicly available Face Recognition Technology (FERET) and Face Recognition Grand Challenge (FRGC) datasets, comprising 1,030 real and 2,000 morphed images. Experimental results demonstrate that the proposed method significantly strengthens the resilience of FRS to morphing attacks, achieving a high detection accuracy of 99.9%. This confirms the model’s effectiveness in distinguishing between real and manipulated images with minimal errors.
The study aims to identify the mechanical and electrical activities of the heart according to the energy systems of advanced players and to detect the differences between the energy systems in terms of the mechanical and electrical activities of the heart for advanced players. It was clear from the results of the significance of the differences between the three groups according to the energy systems of the advanced players in all research variables that (the non-oxygenic system "Lactic"), which represents the advanced players in the arches (800 m, 1500 m) was the first in most tests of mechanical and electrical activities of the heart, which is (Margaria-Kalamen, Wingate, systolic muscle strength of the heart FC, Stroke Volume SV
... Show Moreتعد المحاسبة بشكل عام علماً لكنها ليست من العلوم الصرفة وإنما من العلوم الإجتماعية مما يتطلب للتعامل مع المواضيع المحاسبية الأخذ بنظر الاعتبار الأشخاص المعنيين بالموضوع سواء كانوا المعدين للمخرجات المحاسبية أي المحاسبين، أو الاطراف ذوي المصالح المعنيين والمستفيدين من هذه المخرجات أي المستخدمين، ويعد المحاسب جزءاً من العملية الاجرائية نفسها وبهذا يكون دوره مزدوجاً يجمع بين كونه القائم بالبحث والقي
... Show MoreImage recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
The study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in det
In this research the hard chromium electroplating process, which is one of the common methods of overlay coating was used, by using chromium acid as source of chromium and sulphuric acid as catalyst since the ratio between chromic acid and sulphuric acid is (100 : 1) consequently. Plating process was made by applying current of density (40 Amp / dm2) and the range of solution temperature was (50 – 55oC) with different time periods (1-5 hr). A low carbon steel type (Ck15) was used as substrate for hard chromium electroplating. Solid carburization was carried out for hard chromium plating specimen at temperature (925oC) with time duration (2 hr) to be followed with quenching and tempering
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.
Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis