Preferred Language
Articles
/
bsj-1300
Combined DWT and DCT Image Compression Using Sliding RLE Technique
...Show More Authors

A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V color space information giving the approximate and the detail coefficients. The detail coefficients are quantized, coded using run length encoding (RLE) and SRLE. The approximate coefficients were coded using DCT, since DCT has superior compression performance when image information has poor power concentration in high frequency areas. This output is also quantized, coded using RLE and SRLE. Test results showed that the proposed DWT DCT SRLE system proved to have encouraging results in terms of Peak Signal-to-Noise Ratio (PSNR), Compression Factor (CF) and execution time when compared with some DWT based image compressions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising
...Show More Authors

Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .

                In this paper  a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering  and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Studying Hueckel Edge Detector Using Binary Step Edge Image
...Show More Authors

Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.  

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Extraction and Determination of Amygdaline in Iraqi Plant Seeds Using the Combined Simple Extraction Procedure and High-Performance Liquid Chromatography
...Show More Authors

Abstract :In this study, amygdaline in Iraqi plant seeds was extracted and isolated from their seeds matrix using reflux procedure and subsequently identified and determined by high performance liquid chromatography (HPLC) on reversed phase column of LC-18 (150mm x 4.6mm, 5?m )with actonitrile :water ( 50 : 50 ) as mobile phase at flow rate of ( 0.5 mL/min ) and detection at wavelength of 215 nm.The experimental results indicated that the linearity of calibration is in the range of 1.0-30.0 mg L-1amygdaline with the correlation coefficient of 0.9949. The limit of detection (LOD) and limit of quantitation (LOQ) for amygdaline were of 0.88 and 2.93 mg L-1 in standard pure sample. The mean recovery percent is 97.34±0.58 at 95% confidence inte

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Prediction of Compressive Strength of Reinforced Concrete Structural Elements by Using Combined Non-Destructive Tests
...Show More Authors

This research is devoted to investigate relationship between both Ultrasonic Pulse Velocity and Rebound Number (Hammer Test) with cube compressive strength and also to study the effect of steel reinforcement on these relationships.
A study was carried out on 32 scale model reinforced concrete elements. Non destructive testing campaign (mainly ultrasonic and rebound hammer tests) made on the same elements. About 72 concrete cubes (15 X 15 X15) were taken from the concrete mixes to check the compressive strength.. Data analyzed.Include the possible correlations between non destructive testing (NDT) and compressive strength (DT) Statistical approach is used for this purpose. A new relationships obtained from correlations results is give

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Fast Lossless Compression of Medical Images based on Polynomial
...Show More Authors

In this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Fri Sep 09 2022
Journal Name
Research Anthology On Improving Medical Imaging Techniques For Analysis And Intervention
Groupwise Non-Rigid Image Alignment Using Few Parameters
...Show More Authors

Groupwise non-rigid image alignment is a difficult non-linear optimization problem involving many parameters and often large datasets. Previous methods have explored various metrics and optimization strategies. Good results have been previously achieved with simple metrics, requiring complex optimization, often with many unintuitive parameters that require careful tuning for each dataset. In this chapter, the problem is restructured to use a simpler, iterative optimization algorithm, with very few free parameters. The warps are refined using an iterative Levenberg-Marquardt minimization to the mean, based on updating the locations of a small number of points and incorporating a stiffness constraint. This optimization approach is eff

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Bio-inspired Computing – Theories And Applications
Image Segmentation Using Membrane Computing: A Literature Survey
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF