Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.
The research aims to explain the role of huge data analyzes in measuring quality costs in the Iraqi company for the production of seed, and the research problem was diagnosed with the weakness of the approved method to measure quality costs, and the weak traditional systems of data analyzes, the researcher in the theoretical aspect relied on collecting sources and previous studies, as well as Adoption of the applied analytical approach in the practical aspect, as a set of financial analyzes were applied within the measurement of quality costs and a statement of the role of data analyzes in the practical side, the research concluded to a set of conc
... Show MoreThis study deals with the application of surface-consistent deconvolution to the two-dimensional seismic data applied to the Block 11 area within the administrative boundaries of Najaf and Muthanna Governorates with an area of 4822 , the processed seismic data of line (7Gn 21) is 54 km long. The study was conducted within the Processing Department of the Oil Exploration Company. The gap surface- consistent deconvolution was applied using best results of the parameters applied were: The length of the operator 240, the gap operator 24, the white noise 0.01%, the seismic sections of this type showed improvement with the decay of the existing complications and thus give a good continuity of the reflectors
... Show MoreThe spread of Coronavirus has forced populations around the globe to adopt strict measures such as lockdown, home quarantine, and home office. Moreover, in the current development of network communications, people can exploit internet and intranet features in many systems that need to be faster, more efficient, and available on time. Furthermore, with the benefits of using internet-of-things (IoT), through which things are generated, gained, discovered, and proposed without interference, the user could receive the last status without exertion and direct contact (i.e., in a contactless manner). These specifications can be used in a transaction system. This paper proposes an electronic transaction system (ETS) as a replacement for the curr
... Show MoreWater balance as a technique is considered one of the means that is relied upon in solving significant hydrological problems. The soil and water assessment tool (SWAT) model was used in this study to assess the water balance in the Wadi Al-Mohammadi basin located at the eastern edge of the Western Desert. Digital elevation model, soil data, Land use - Land cover, and climate data represent the most important requirements for the SWAT model's input as a database. The Wadi Al-Mohammadi basin delineation results show the overall drainage area was 2286.8 km2 with seven sub-basins. The trend line of climate data indicates a clear increase in the total rainfall, relative humidity, temperature, and solar radiation from 1990-
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreWithin the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show MoreAn interpretative study of the two-dimensional seismic data of the Afaq area was conducted using the Petrel 2017 software. 2D seismic reflection sections are used to give a structural interpretation of Afaq structure based on synthetic seismogram and well log data. Three reflectors, Zubair, Yamama, and Gotina Formations, were selected. These reflectors are defined from well west kifl (wk-1), Where located adjacent to the study area. Structural maps of the Zubair, Yamama, and Gotnia formations are prepared and interpreted, including TWT maps, Average velocity maps, and depth maps. The studies concluded that the Afaq structure area does not contain main faults, but secondary faults with short and limited extensions
... Show MoreThe seismic method depends on the nature of the reflected waves from the interfaces between layers, which in turn depends on the density and velocity of the layer, and this is called acoustic impedance. The seismic sections of the East Abu-Amoud field that is located in Missan Province, south-eastern Iraq, were studied and interpreted for updating the structural picture of the major Mishrif Formation for the reservoir in the field. The Mishrif Formation is rich in petroleum in this area, with an area covering about 820 km2. The horizon was calibrated and defined on the seismic section with well logs data (well tops, check shot, sonic logs, and density logs) in the interp
... Show More