Preferred Language
Articles
/
ijs-10111
Linear Feedback Shift Registers-Based Randomization for Image Steganography
...Show More Authors

     Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount. These methods embed the data in a random location with a random amount, further enhancing the level of obfuscation. A pseudo-random binary key that is generated through a nonlinear combination of eight Linear Feedback Shift Registers (LFSRs) controls this randomness. The experimentation involves various 512x512 cover images. The first method achieves an average PSNR of 43.5292 with a payload capacity of up to 16% of the cover image. In contrast, the second method yields an average PSNR of 38.4092 with a payload capacity of up to 8%. The performance analysis demonstrates that the LSB-based method can conceal more data with less visibility, however, it is vulnerable to simple image manipulation. On the other hand, the DCT-based method offers lower capacity with increased visibility, but it is more robust.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 28 2019
Journal Name
Iraqi Journal Of Science
Improved VSM Based Candidate Retrieval Model for Detecting External Textual Plagiarism
...Show More Authors

A rapid growth has occurred for the act of plagiarism with the aid of Internet explosive growth wherein a massive volume of information offered with effortless use and access makes plagiarism  the process of taking someone else’s work (represented by ideas, or even words) and representing it as other's own work  easy to be performed. For ensuring originality, detecting plagiarism has been massively necessitated in various areas so that the people who aim to plagiarize ought to offer considerable effort for introducing works centered on their research.

     In this paper, work has been proposed for improving the detection of textual plagiarism through proposing a model for can

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Thu Jun 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Studying Hueckel Edge Detector Using Binary Step Edge Image
...Show More Authors

Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.  

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Mar 25 2022
Journal Name
Journal Of The College Of Basic Education
Semantic image coding in contemporary Theatrical performance
...Show More Authors

تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Software & Hardware Research In Engineering
Frontal Facial Image Compression of Hybrid Base
...Show More Authors

Publication Date
Mon Jul 01 2019
Journal Name
International Journal Of Computer Science And Mobile Computing
Color Image Compression of Inter-Prediction Base
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Comparing the Main Approaches of Image Segmentation
...Show More Authors

Images are important medium for conveying information; this makes improvement of image processing techniques also important. Interpretation of image content is one of the objectives of image processing techniques. Image interpretation that segments the image to number of objects called image segmentation. Image segmentation is an important field to deal with the contents of images and get non overlapping regions coherent in texture and color, it is important to deal only with objects with significant information. This paper presents survey of the most commonly used approaches of image segmentation and the results of those approaches have been compared and according to the measurement of quality presented in this paper the Otsu's threshol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Visible image watermarking using biorthogonal wavelet transform
...Show More Authors

In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Analytical Study of Medical Image Combination Techniques
...Show More Authors

Image combination is a technique that fuses two or more medical images taken with different conditions or imaging devices into a single image contain complete information. In this study relied on mathematical, statistical and spatial techniques, to fuse MRI images that captured horizontal and vertical times (T1, T2),  and applied a method of supervised classification based on the minimum distance before and after combination process, then examine the quality of the resulting image based on the statistical standards resulting from the analysis of edge analysis, showing the results to identify the best techniques adopted in combination process, determine the exact details in each class and between classes.

View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Effective Digital Image Colors Reduction/Quantization Method
...Show More Authors

In the current research work, a method to reduce the color levels of the pixels within digital images was proposed. The recent strategy was based on self organization map neural network method (SOM). The efficiency of recent method was compared with the well known logarithmic methods like Floyd-Steinberg (Halftone) dithering and Octtrees (Quadtrees) methods. Experimental results have shown that by adjusting the sampling factor can produce higher-quality images with no much longer run times, or some better quality with shorter running times than existing methods. This observation refutes the repeated neural networks is necessarily slow but have best results. The generated quantization map can be exploited for color image compression, clas

... Show More
View Publication Preview PDF