Preferred Language
Articles
/
KxYJIYgBVTCNdQwCp3Ss
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signal-noise ratio (PSNR), mean square error (MSE) and correlation) were conducted on a group of images to determine the strength and efficiency of the proposed method, and the result proves that the proposed method provided a good level of safety. The obtained results were compared with those of other methods, and the result of comparing confirms the superiority of the proposed method.

Scopus Crossref
View Publication
Publication Date
Tue Oct 18 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM

... Show More
Scopus (13)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Multifocus Images Fusion Based On Homogenity and Edges Measures
...Show More Authors

Image fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 04 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The

... Show More
Publication Date
Wed Jul 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Calculating the Vertical Displacement using the Method of Least Squares Adjustment and 3D Objects Fitting
...Show More Authors
Abstract<p>In this research, the Iraqi flagpole at Baghdad University, which is the longest in Baghdad, with a height of 75m, was monitored. According to the importance of this structure, the calculation of the displacement (vertical deviation) in the structure was monitored using the Total Station device, where several observations were taken at different times for two years the monitoring started from November 2016 until May 2017, at a rate of four observations for one year. The observation was processed using the least square method, and the fitting of circles, and then the data was processed. The deviation was calculated using the Matlab program to calculate the values of corrections, where </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 01 2024
Journal Name
Journal Of Engineering
Orbital Prosthesis Rehabilitation in Biomedical Engineering by Means of Computer Vision-Photogrammetry and 3D Prototyping
...Show More Authors

Eye loss may be caused as a result of eye trauma, accidents, or malignant tumors, which leads the patient to undergo surgery to remove the damaged parts. This research examines the potential of computer vision represented by Structure from Motion (SfM) photogrammetry in fabricating the orbital prosthesis as a noninvasive and low-cost technique. A low-cost camera was used to collect the data towards extracting the dense 3D data of the patient facial features following Structure from Motion-Multi View Stereo (SfM-MVS) algorithms. To restore the defective orbital, a Reverse Engineering (RE) based approach has been applied using the similarity RE algorithms based on the opposite healthy eye to rehabilitate the defected orbital precisely

... Show More
View Publication
Crossref
Publication Date
Fri Mar 29 2024
Journal Name
Surgical Neurology International
Enhancing neuro-ophthalmic surgical education: The role of neuroanatomy and 3D digital technologies – An overview
...Show More Authors
Background:

Neuro-ophthalmology, bridging neurology and ophthalmology, highlights the nervous system’s crucial role in vision, encompassing afferent and efferent pathways. The evolution of this field has emphasized the importance of neuroanatomy for precise surgical interventions, presenting educational challenges in blending complex anatomical knowledge with surgical skills. This review examines the interplay between neuroanatomy and surgical practices in neuro-ophthalmology, aiming to identify educational gaps and suggest improvements.

Methods:

A literature search across databases such as PubMed, Scopus, and W

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
The Theory of knowledge And Their Repercussions On the Journalistic Image In Electronic Designs Websites
...Show More Authors

represent websites link support of human communicate and cohesion of cultures different depending on their languages and their environments around, it was the evolution of one of the most important means of communication of services for electronic networks, the Internet active role in containing the world Bbodqh science and knowledge to Taatlaqah cultures from which derives its intellectual and cognitive cupboards continuity and as a link language for each those environmental Altdadat, linguistic, religious, political, economic . We all know that these electronic means difficult promise ring intellectual and mental connectivity for the masses polarized without being of the image as an element Kravekaa supporter of the electronic media an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Sci.int.(lahore)
The Effect of Wavelet Coefficient Reduction on Image Compression Using DWT and Daubechies Wavelet Transform
...Show More Authors

FG Mohammed, HM Al-Dabbas, Science International, 2018 - Cited by 2

View Publication
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More