Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreEnergy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the
... Show MoreA common approach to the color image compression was started by transform
the red, green, and blue or (RGB) color model to a desire color model, then applying
compression techniques, and finally retransform the results into RGB model In this
paper, a new color image compression method based on multilevel block truncation
coding (MBTC) and vector quantization is presented. By exploiting human visual
system response for color, bit allocation process is implemented to distribute the bits
for encoding in more effective away.
To improve the performance efficiency of vector quantization (VQ),
modifications have been implemented. To combines the simple computational and
edge preservation properties of MBTC with high c
Heat transfer around a flat plate fin integrated with piezoelectric actuator used as oscillated fin in laminar flow has been studied experimentally utilizing thermal image camera. This study is performed
for fixed and oscillated single and triple fins. Different substrate-fin models have been tested, using fins of (35mm and 50mm) height, two sets of triple fins of (3mm and 6mm) spacing and three frequencies
applied to piezoelectric actuator (5, 30 and 50HZ). All tests are carried out for (0.5 m/s and 3m/s) in subsonic open type wind tunnel to evaluate temperature distribution, local and average Nusselt number (Nu) along the fin. It is observed, that the heat transfer enhancement with oscillation is significant compared to without o
The impact of undergraduate research experiences on students' academic development and retention in STEM fields is significant. Students' success in STEM fields is based on developing strong research and critical thinking skills that make it essential for students to engage in research activities throughout their academic programs. This work evaluates the effectiveness of undergraduate research experiences with respect to its influence on student retention and academic development. The cases presented are based on years of experience implementing undergraduate research programs in various STEM fields at Colorado State University Pueblo (CSU Pueblo) funded by HSI STEM Grants. The study seeks to establish a correlation between students' reten
... Show MoreThe aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.