Preferred Language
Articles
/
IhZTj4oBVTCNdQwChZ-K
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the stego-image and also it is robust, to some extents against several levels of JPEG compression.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
Malaysian Journal Of Science
INVESTIGATION OF FAST NEURON ATTENUATION COEFFICIENTS FOR SOME IRAQI BUILDING MATERIALS
...Show More Authors

This research aims to improve the radiation shielding properties of polymer-based materials by mixing PVC with locally available building materials. Specifically, two key parameters of fast neutron attenuation (removal cross-section and half-value layer) were studied for composite materials comprising PVC reinforced with common building materials (cement, sand, gypsum and marble) in different proportions (10%, 30% and 50% by weight). To assess their effectiveness as protection against fast neutrons, the macroscopic neutron cross-section was calculated for each composite. Results show that neutron cross-section values are significantly affected by the reinforcement ratios, and that the composite material PVC + 50% gypsum is an effect

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Mathematical Modeling of Glucose Regulation System in Term of Perturbed Coefficients
...Show More Authors

In this research a recent developed practical modeling technique is applied for the glucose regulation system identification. By using this technique a set of mathematical models is obtained instead of single one to compensate for the  loss of information caused by the optimization technique in curve fitting algorithms, the diversity of members inside the single set is interpreted in term of restricted range of its parameters, also a diagnosis criteria is developed for detecting any disorder in the glucose regulation system by investigating the influence of variation of the parameters on the response of the system, this technique is applied in this research practically  for 20 cases with association of  National Center for

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Oncology And Radiotherapy
The role of Modulation Complexity Score (MCS) of the VMAT and IMRT techniques in the treatment planning of left non-small lung cancer
...Show More Authors

Background: Lung cancer is a common disease for patients over the age of 50 years, especially males due to smoking habits. This study aimed to compare the modulation complexity score (MCS) for the advanced treatment planning techniques which the intensity modulated radiation therapy (IMRT) and volumetric modulated arc therapy (VMAT). Materials and Methods: Thirty patients who had non-small lung cancerous tumors on their left side participated in this study. The range ages were 68 to 98 years, the heights were between 151 and 182cm and they having weights from 46 to 79 kg. For Each patient will create two plans dial using two different techniques, which will be Intensity Modulated Radiation Therapy (IMRT) and Volumetric Modulated Arc Therapy

... Show More
Scopus (1)
Scopus
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (17)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
The effect of the activation functions on the classification accuracy of satellite image by artificial neural network
...Show More Authors

View Publication
Scopus (20)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Frequency and Wavelength Dependences of the Electro-optic Coefficients r63 and r41 in Congruent KDP Crystals
...Show More Authors

The electro-optic coefficient r63 and r41 are determined in congruent KDP crystals, using an experimental method based upon the direct measurement of material. Sénarmont system for electro-optic coefficient measurement and characterization of crystals was modified. This modification allowed us to obtain on the frequency dispersion dependence of the electro-optic coefficients within a frequency range up to 20 MHz and on a new version of modulation depth method. To the best of our knowledge, by using this system, the electro-optic coefficients r63 and r41 in different configurations (transverse and longitudinal) have been measured for the first time within a frequency range up to 20 MHz. The measurements have been investigated as a functi

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 02 2014
Journal Name
Journal Of The Islamic University College
The image of the family in dubbed Turkish series and their potential impact on Iraqi youth
...Show More Authors

Since the nineties of the last century, Iraqi youth have been exposed to Mexican soap operas dubbed into classical Arabic, and the stories and ideas presented by these series were almost new to all the minds of the youth at that time, a culture completely different from the culture we have of social relations, and since the number of episodes was more than Of the 100 episodes, exposure to these series has left young people confused by the addiction to all their ideas and stories. They differ from the foreign films (mostly American) that we used to watch, and they only take two hours (at most). These films contain diverse stories and may be forgotten. Memory includes events and characters in their entirety at times, and you may remember th

... Show More
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology Journal
The Effect of Re-Use of Lossy JPEG Compression Algorithm on the Quality of Satellite Image
...Show More Authors

In this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.

View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication