Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in the slices with the highest saturation for embedding a secret message in the NROI because the ROI contains the information of the ill, so it cannot be modified. The evaluation of the proposed method using PSNR and MSE shows good results according to both requirements of the watermark system, the invisibility and quality of the watermarked medical image where the PSNR value is up to 43.3936 and MSE is up to 0.000041.
م.د. فاطمة حميد ،أ.م.د وفاء صباح محمد الخفاجي, International Journal of Psychosocial Rehabilitation,, 2020 - Cited by 1
Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method
... Show MoreConcealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary, hide two bits from the message in two bits of the least significant b
... Show MoreAdvertisements containing images of women represent one of the most controversial topics of the advertising industry and has an impact on people and trends. This study aims to determine the typical mental image of women purveyed through visual advertising in the Arab media. It also aims to find out whether these advertisements portray women positively or negatively, in addition to investigating the reasons for the recent negative portrayal of women in commercials. The study adopted a descriptive-analytical approach to achieve these objectives. The results indicate that advertising designs that carry images of women displayed in the Arab media create strong mental images. Repetition reinforces these images, and they emphasize the concept
... Show MoreIn life in general and in the press, especially the success of a particular message depends heavily shipments carried by, and images idyllic suggestive, how many meanings that reaching an audience, and is the magazines and one of those media that target a broad audience, trying to please Him and the acquisition of his attention through a form of aesthetic granted pleasure and satisfaction from this point of view, read image ad as Date pure incident of everyday life, and here was placed this research about the aesthetic image advertising in the covers of women's magazines, which has been briefing them through the Four Seasons included in the search, was the first chapter Batarh systematic talked about problem Find the placing on the form
... Show MoreData <span>transmission in orthogonal frequency division multiplexing (OFDM) system needs source and channel coding, the transmitted data suffers from the bad effect of large peak to average power ratio (PAPR). Source code and channel codes can be joined using different joined codes. Variable length error correcting code (VLEC) is one of these joined codes. VLEC is used in mat lab simulation for image transmission in OFDM system, different VLEC code length is used and compared to find that the PAPR decreased with increasing the code length. Several techniques are used and compared for PAPR reduction. The PAPR of OFDM signal is measured for image coding with VLEC and compared with image coded by Huffman source coding and Bose-
... Show Moreيتناول البحث شخصية شعرية وأدبية فذة هو محمد صالح بحر العلوم الشاعر العراقي المعروف والمولود في بيت ثوري من بيوتات النجف المعادية للاستعمار البريطاني في مطلع القرن العشرين، وينحدر من أسرة عريقة مشهورة بالعلم والأدب، عاش بحر العلوم شاعراً ينقل بصوره الجمالية كل ما يقع في حواسه، وتجربته تثري من اتصاله ببيئته فنجد الشاعر اشبه بالمصور يستمد صوره من واقع بيئته المتنوع. ونحن في بحثنا هذا نحاول أن نرصد أهم المصادر
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More