In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Background: The success and maintenance of indirect dental restorations is closely related to the marginal accuracy, which is affected by many factors like preparation design, using of different fabrication techniques, and the time of taking final impression and pouring it. The purpose of this in vitro study was to evaluate the effect of different pouring time of conventional impression on the vertical marginal gap of full contour zirconia crowns in comparison with digital impression technique. Materials and Methods: Forty sound recently extracted human permanent maxillary first premolar teeth of comparable size and shape were collected. Standardized preparation of all teeth samples were carried out to receive full contour zirconia crown re
... Show MoreBackground: The success and maintenance of indirect dental restorations is closely related to the marginal accuracy, which is affected by many factors like preparation design, using of different fabrication techniques, and the time of taking final impression and pouring it. The purpose of this in vitro study was to evaluate the effect of different pouring time of conventional impression on the vertical marginal gap of full contour zirconia crowns in comparison with digital impression technique. Materials and Methods: Forty sound recently extracted human permanent maxillary first premolar teeth of comparable size and shape were collected. Standardized preparation of all teeth samples were carried out to receive full contour zirconia crown re
... Show MoreAim: The current study was aimed to determine the relationship between the orthodontic force applied by monobloc and the salivary level of alkaline phosphatase (ALP) and lactate dehydrogenase (LDH) enzymes, considering the time factor after insertion of the appliance and whether there is a correlation between these enzymes. Materials and methods: A sample of 28 growing patients requiring orthodontic treatment with myofunctional appliance (Monoblock) was taken for the current study with an age range 9 to 12 years,all patients had Angle's class II division 1 malocclusion with no or mild crowding, the sample was selected using simple random sampling. Only 16 subjects (10 males and 6 females) were included who follow certain inclusion criteria.
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More