Preferred Language
Articles
/
ijs-1000
Localization of the Optic Disc in Retinal Fundus Image using Appearance Based Method andVasculature Convergence

Optic Disc (OD) localization is a basic step for the screening, identification and appreciation of the risk of diverse ophthalmic pathologies such as glaucoma and diabetic retinopathy.In fact, the fundamental step towards an exact OD segmentation process is the success of OD localization. This paper proposes a fully automatic procedure for OD localization based on two of the OD most relevant features  of high-intensity value and vasculature convergence. Merging ofthese two features renders the proposed method capable of localizing the OD within the variously complicated environments such as the faint disc boundary, unbalanced shading, and the existence of retinal pathologies like cotton wall and exudates,which usually share the same color and structure with the OD. To demonstrate the robustness, reliability and broad applicability of the proposed approach,we tested 1614 images from publically available datasets, including Messidor (1200 images), TheStandard Diabetic,Retinopathy Database (DIARETDB0 ,130 images), Digital Retinal,Images for Optic Nerve,Segmentation (DRIONS ,110 images), TheStandard Diabetic,Retinopathy Database (DIARETDB1,89 images),High,Resolution Fundus (HRF,45 images),and Digital,Retinal Image for Vessels,Extraction (DRIVE,40 images). The method successfully localized 1599 images and failed in 15 images, with an average success rate of 99.07% and an average computation time of 0.5 second per image.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
Scopus (5)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
View Publication
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Low computations in compression image schemes using Cache codebook based on Weber's law

In this paper, we have employed a computation of three technique to reduce the computational complexity and bit rate for compressed image. These techniques are bit plane coding based on two absolute values, vector quantization VQ technique using Cache codebook and Weber's low condition. The experimental results show that the proposed techniques achieve reduce the storage size of bit plane and low computational complexity.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
View Publication Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Bronchogenic carcinoma in sample of Iraqi patients, Fiber optic bronchoscope findings

Background: Lung cancer is the leading cause of cancer deaths and its incidence is rising. The determination of histopathology and stage of primary lung carcinoma is crucial to develop appropriate treatment approach that affects morbidity and mortality. Fiber optic bronchoscope techniques for early detection of lung cancer are a promising tool as they might allow visualizing changes of early lung cancer and also permitting sampling for histological confirmation.
Objective: This study was intended to compare the fiber optic bronchoscopy findings and their anatomical locations with the histopathology types in patients with lung cancer.
Patient and Methods: A cross section study was conducted during the period

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Oil spill classification based on satellite image using deep learning techniques

 An oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
Scopus (5)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Fri Sep 01 2017
Journal Name
International Journal Of Engineering Research And Advanced Technology
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More