Preferred Language
Articles
/
ijp-476
Blood Vessels Detection of Diabetic Retinopathy from Retinal Fundus Image using Image Processing Techniques
...Show More Authors

 

Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from the digital fundus images. In this research, a novel methodology was introduced to separate retinal blood vessel network. The suggested system in this research involves four stages, after image acquisition, the pre-processes of the image to preparing and improving the image quality is the first stage. Morphological operations are used for the detection of blood vessels. In this research, we will use two morphological operations: erosion and dilation. These two operations have two inputs, a binary image, and a structuring element object. We will use two morphological processes (boundary extraction and top, bottom hat transform). Before these operations, we will use applying a canny edge detector technique to obtain the edges of the retina image. The technique is tried on shading retinal pictures acquired from STARE and DRIVE databases which are accessible on the web as well as the samples of retinal images were obtained from the digital camera from Ibn Al-Haytham specialist Hospital for Eye in Baghdad, Iraq. Good results and effective were obtained for blood vessel detected and extract

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
An Improved Segmentation Technique for Early Detection of Exudates of Diabetic Retinopathy Disease
...Show More Authors

Diabetic retinopathy (DR) is a diabetes- caused disease that is associated with  leakage of fluid from the blood vessels into the retina, leading to its damage. It is one of the most common diseases that can lead to weak vision and even blindness. Exudates is a clear indication of diabetic retinopathy, which is the main cause of blindness in people with diabetes. Therefore, early detection of exudates is a crucial and essential step to prevent blindness and vision loss is in the analysis of digital diabetic retinopathy systems. This paper presents an improved approach for detection of exudates in retina image using supervised-unsupervised Minimum Distance (MD) segmentation method. The suggested system includes three stages; First, a

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Cureus
The Effect of Pan-Retinal Photocoagulation on Central Macular Thickness in a Sample of Iraqi Patients With Proliferative Diabetic Retinopathy
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Fri Feb 07 2025
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Image Compression Using Deep Learning: Methods and Techniques
...Show More Authors

     In recent years images have been used widely by online social networks providers or numerous organizations such as governments, police departments, colleges, universities, and private companies. It held in vast databases. Thus, efficient storage of such images is advantageous and its compression is an appealing application. Image compression generally represents the significant image information compactly with a smaller size of bytes while insignificant image information (redundancy) already been removed for this reason image compression has an important role in data transfer and storage especially due to the data explosion that is increasing significantly. It is a challenging task since there are highly complex unknown correlat

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Classification of Iraqi Anber Rice by Using Image Processing and KNN Algorithm
...Show More Authors

Image classification takes a large area in computer vision in term of quality or type or data sharing and so on Iraqi Anber Rice in they need this kind of work, where few in the field of computer science that deal with the types of Iraqi Anber rice, and because of the Anber Rice are grown and produced in Iraq only, and because of the importance of rice around the world and especially in Iraq. In this paper a proposed system distinguishes between the classes of Iraqi Anber Rice that Grown in different parts of Iraq, and have their own specifications for each class by using moment invariant and KNN algorithm. Iraqi Anber Rice that is more than Fiftieth class Cultivated and irrigated in different parts of Iraq, and because of the different

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation of tbe Intensity Distribution by Image Processing
...Show More Authors

Image   processing   is  an   important   source   for   the  image

analytical    in   order    to    get   variable    parameters    such   as   the

intensity  .In  present   work  it  has  been  found   a  relation   between the  tensity and  number    of  pixd  in  the  image  ,  and  from  this relation   we  have   got   in  this  paper   the  inten

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication