Preferred Language
Articles
/
_hbaOowBVTCNdQwCRvmN
Hiding Information Using different lighting Color images

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Mar 20 2023
Journal Name
2023 International Conference On Information Technology, Applied Mathematics And Statistics (icitams)
Scopus Crossref
View Publication
Publication Date
Mon May 01 2023
Journal Name
Journal Of Economics And Administrative Sciences (jeas)
Using Statistical Methods to Increase the Contrast Level in Digital Images

This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods

Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Using Statistical Methods to Increase the Contrast Level in Digital Images

This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram, and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods.

 

Crossref
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
Automated Methods to Segment Kidneys and Detect Tumors Using CT Images

Kidney tumors are of different types having different characteristics and also remain challenging in the field of biomedicine. It becomes very important to detect the tumor and classify it at the early stage so that appropriate treatment can be planned. The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of kidney tumors. In this paper, tried to implement an automated segmentation methods of gray level CT images is used to provide information such as anatomical structure and identifying the Region of Interest (ROI) i.e. locate tumor, lesion and other in kidney.
A CT image has inhomogeneity, noise which affects the continuity and accuracy of the images segmentation. In

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 25 2018
Journal Name
International Journal Of Engineering Trends And Technology
Crossref (1)
Crossref
View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
Crossref
View Publication
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Data Hiding in 3D Model Based on Surface Properties

    Data hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
Lighting and formal processors for spaces of shops selling mobile phones: عمار نعمة كاظم

This research is marked by " lighting and processors formalism for spaces of shops selling mobile phones ," aims to " reveal about the relationship between lighting treatments formal designs spaces own internal selling mobile phone in addition to the recognition criteria Altsamama to lighting techniques and processes formality spaces shops competent to sell mobile phone " and lies the importance of this research in the " active role of the lighting in the building processors formalities and processes to prepare designs and show the final form integrated functionally and aesthetically so as to be ready for implementation , taking into consideration the role expressionist in the recipient and to make these spaces more than meet the require

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Apr 19 2017
Journal Name
Iraqi Dental Journal
Crossref
View Publication