In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s
Image Fusion Using A Convolutional Neural Network
Background: e cerebellum is divided into two hemispheres and contains a narrow midline zone called thevermis. A set of large folds are conventionally used to divide the overall structure into ten smaller "lobules". evermis receives fibres from the trunk and proximal portions of limbs, But the question is that does the cerebellum have the same measurementvalues in males and females of the same age?Material and method: e present study used 80 sectional brain MRI images (40: males, 40: females); 35-50 years old as indices of size for thevermian structures of the Cerebellum. is middle age group was taken because as known generally it could be neither an age of growth as inthe young nor of atrophy as in old individuals. e aim rega
... Show MoreIn this research, an analysis for the standard Hueckel edge detection algorithm behaviour by using three dimensional representations for the edge goodness criterion is presents after applying it on a real high texture satellite image, where the edge goodness criterion is analysis statistically. The Hueckel edge detection algorithm showed a forward exponential relationship between the execution time with the used disk radius. Hueckel restrictions that mentioned in his papers are adopted in this research. A discussion for the resultant edge shape and malformation is presented, since this is the first practical study of applying Hueckel edge detection algorithm on a real high texture image containing ramp edges (satellite image).
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
Triticale is being evaluated as a substitute for corn in animal feed and as a forage crop for Florida. Storage of triticale seed is difficult in Florida's hot and humid climate, and more information about the relationships between equilibrium moisture content (EMC) and equilibrium relative humidity (ERH) at constant temperature (sorption isotherms) of triticale is needed to develop improved storage methods. Therefore, the primary research objective was to measure the EMC for triticale seed at different ERH values at three different constant temperatures (5°C, 23°C, and 35°C) using six desiccation jars containing different saturated salt concentrations. The secondary objective was to determine the best fit equation describing these relati
... Show More