Preferred Language
Articles
/
bsj-879
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
مجلة الأطروحة العلمية المحكمة-العلوم الصرفة والتطبيقية
Detection of Lead (Pb) and Cadmium (Cd) Concentrations in Some Indomie Samples
...Show More Authors

Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Global Pharma Technology
Detection of HBME-1 and galectin-3 by immunohistochemistry in follicular lesions
...Show More Authors

The main problem established by a discovery of a thyroid nodule is to discriminate between a benign and malignant lesion. Differential diagnosis between follicular thyroid cancer (FTC) and benign follicular thyroid adenoma (FTA) is a great challenge for even an experienced pathologist and requires special effort. A developing number of some encouraging IHC markers for the differential diagnosis of thyroid lesions have emerged, including, Hector Battifora mesothelial (HBME-1) and galectin-3 (Gal-3). There was significant positive correlation between Galectin-3 and HBME-1 in follicular carcinoma and follicular variant of papillary carcinoma (r= 0.380, P= 0.041) and (r= 0.315, P=0.047) respectively. There was no significant correlation between

... Show More
Scopus
Publication Date
Wed Jul 10 2024
Journal Name
The Open Neuroimaging Journal
The Efficacy of Bedside Chest Ultrasound in the Detection of Traumatic Pneumothorax
...Show More Authors
Background

Chest X-rays have long been used to diagnose pneumothorax. In trauma patients, chest ultrasonography combined with chest CT may be a safer, faster, and more accurate approach. This could lead to better and quicker management of traumatic pneumothorax, as well as enhanced patient safety and clinical results.

Aim

The purpose of this study was to assess the efficacy and utility of bedside US chest in identifying traumatic pneumothorax and also its capacity to estimate the extent of the lesion in comparison to the gold standard modality chest computed tomography.

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Crossref
Publication Date
Wed Nov 26 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of different staining materials on color stability of sapphire brackets bonded with different types of light cure orthodontic adhesives (An in vitro study)
...Show More Authors

Background: The demand for better esthetic during orthodontic treatment has increased nowadays, so orthodontists starting using esthetic arch wires, brackets and ligatures.Tooth colored brackets were introduced in different types of materials. Sapphire ceramic brackets are one type of esthetic brackets and their color stability remains the main concern for the clinicians and patients at the same time. The present study design to evaluate the effect of three different staining materials (pepsi, black tea and cigarette smoke) on the stainability of sapphire ceramic brackets bonded with three types of light cure orthodontic adhesives which include: Resilience, Enlight and Transbond. Materials and Methods: The sample consisted of three hundre

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors

Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication