Preferred Language
Articles
/
C0JT-JkBMeyNPGM3PLvD
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to deception by morphed images. Finally, morph detection and classification are conducted using the proposed SNN framework, which incorporates a novel feature fusion strategy based on Canonical Correlation Analysis (CCA) to enhance discriminative power. The model is trained and evaluated using publicly available Face Recognition Technology (FERET) and Face Recognition Grand Challenge (FRGC) datasets, comprising 1,030 real and 2,000 morphed images. Experimental results demonstrate that the proposed method significantly strengthens the resilience of FRS to morphing attacks, achieving a high detection accuracy of 99.9%. This confirms the model’s effectiveness in distinguishing between real and manipulated images with minimal errors.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Apr 23 2020
Journal Name
Annals Of Tropical Medicine & Public Health
STUDY THE EFFICACY OF TITANIUM OXIDE (TIO2) NANOPARTICLES AGAINST PROTOSCOLICES OF HYDATID CYSTS
...Show More Authors

Hydatid cyst disease is one of the most common diseases in many places in the world. The infection occurs when human and livestock drinking or eating contaminated water and food with eggs of Echinococcus granulosus worm. Surgery is the best solution to eradicate cysts and rapid healing, but it may be accompanied by some risks such as rupture of the cyst and leakage its contents of protoscolices, which leads to the return of infection and spread in the body. Several methods have been used to reduce the risks of surgery, including withdrawal of hydatid fluid and its contents and injection scolicidal substances like ethanol and others. Researchers have recently tested the efficiency of nanoparticles such as selenium, silver, and gold nanoparti

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Study of the Protective Effects of Benfotiamine Against CCl4-Induced Hepatotoxicity in Rats
...Show More Authors

Liver is considered as the first target for the toxic effects of toxins and other xenobiotics, and this can be attributed to its role as a site which receive all absorbed xenobiotics from the gastrointestinal tract and its role as a major site for biotransformation of xenobiotics. The present study was designed to evaluate the possible hepatoprotective effect of benfotiamine against CCl4-induced hepatotoxicity in rats. The study was conducted on 48 male albino rats; the animals were allocated into 8 groups (6 rats in each group) and treated as follow: 4 groups treated with oral doses of either normal saline, benfotiamine (100 mg/kg), thiamine (100 mg/kg), N-acetylcystein (400 mg/kg) only without induction of hepatic damage. Th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 12 2023
Journal Name
Egyptian Journal Of Biological Pest Control
Evaluation of the effectiveness of some mycorrhizal fungi isolates against charcoal rot disease
...Show More Authors
Abstract<sec> <title>Background

The sunflower plants are attacked by serious seed and soil-borne pathogens including charcoal rot disease that caused by Macrophomina phaseolina. This disease has serious damages to sunflower crop. This study aimed to assess the efficacy of Arbuscular mycorrhizal fungus against charcoal rot disease as fungicide alternative.

Results

Morphological and molecular identification was done, using universal primers for molecular identification. Finally, a greenhouse experiment was conducted, and

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (10)
Scopus Crossref
Publication Date
Tue Nov 04 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of different polishing systems on the surface roughness of full-contour zirconia
...Show More Authors

Background: Adjustment of any premature occlusal contact of any zirconia restoration requires its polishing or glazing in order to restore the smoothness of the restoration. The objective of this in vitro study was to evaluate the effects of different polishing systems and glazing on the surface roughness of full-contour zirconia. Material and methods: Forty disks (diameter: 8 mm, thickness: 6.4 mm) were prepared from pre-sintered full-contoured zirconia block; they were colored and sintered in a high-temperature furnace at 1500ËšC for 8 hours. The specimens were then leveled and finished using grinding and polishing machine and adjusted using diamond disk. The specimens were then randomly divided into four groups (n=10), group I involves

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 20 2021
Journal Name
Plant Archives
The Effect of Plowing and Pulverization Systems on Some Plant Indicators of Onion
...Show More Authors

An experiment was carried out on the fields of the college of Agriculture - Abu Ghraib, of a silty clay loam soil that has moisture of 15-16%, to study the effect of plowing and pulverization systems on some plant indicators of onion. The experiment included plowing systems with three levels (plowing with a moldboard plow, plowing by chisel plow and zero tillage plowing) as a primary factor. The second factor was that pulverization for only one time and repeating the pulverization twice through the use of the rotary tiller. The plant indicators of onion that are studied: plant length, onion diameter, onion weight and onion neck diameter. The experiment has carried out according to SPLIT PLOT design according to RCBD design by three replicat

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 02 2021
Journal Name
Review Of International Geographical Education
Energy Security and Energy Transition in Germany
...Show More Authors

Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More