Preferred Language
Articles
/
ijs-6046
Techniques and Challenges for Generation and Detection Face Morphing Attacks: A Survey
...Show More Authors

      Face recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of  persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit images in a form of a document or via the Internet, and this allows applicants to manipulate the images to produce morphing images. These photos allow both beneficial and harmful partners to cross borders using the same passport. This is considered a major threat to the security systems that allow them to travel without revealing their true identity. This paper aims to provide a comprehensive overview of face morphing attacks and the development taking place in this specialty. This paper describes the techniques for generating metamorphic images and challenges they face, in addition to the advantages and disadvantages of these techniques. It also dealt with types of techniques used in detecting and determining the attack of mutant faces in the field of deep learning or machine learning, in addition to the laws and criteria for measuring the efficiency of the algorithms used. It provides a general summary of the work that has been produced in this field.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
User Authentication via Mouse Dynamics
...Show More Authors

Nowadays, the development of internet communication and the significant increase of using computer lead in turn to increasing unauthorized access. The behavioral biometric namely mouse dynamics is one means of achieving biometric authentication to safeguard against unauthorized access. In this paper, user authentication models via mouse dynamics to distinguish users into genuine and imposter are proposed.  The performance of the proposed models is evaluated using a public dataset consists of 48 users as an evaluation data, where the Accuracy (ACC), False Reject Rate (FRR), and False Accept Rate (FAR) as an evaluation metrics. The results of the proposed models outperform related model considered in the literature.

View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Utilization of Edge Information in Handwritten Numerals Recognition
...Show More Authors

The recognition of handwritten numerals has many applications in automatic identification and cognition. This research contains three experimented scenarios to recognize the handwritten English (i.e. Arabic) numerals. In the first scenario the bilinear interpolation of the image is used, while in the second scenario and after the bilinear interpolation is being applied, the Sobel operators are applied on the resulted interpolated image. In the third scenario which represents the last one, the effect of normalization of image dimensions is tested. 550 images of handwritten numerals were tested. Three types of tests were conducted for each scenario namely: trained-set test, not-trained-set test and comprehensive-set test. Depending on the

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
An Improved Method to Recognize the Iraqi License Plates Using Local Projections
...Show More Authors

The License Plate (LP), is a rectangular metal plate that contains numbers and letters. This plate is fixed onto the vehicle's body. It is used as a mean to identify the vehicle. The License Plate Recognition (LPR) system is a mean where a vehicle can be identified automatically using a computer system. The LPR has many applications, such as security applications for car tracking, or enforcing control on vehicles entering restricted areas (such as airports or governmental buildings). This paper is concerned with introducing a new method to recognize the Iraqi LPs using local vertical and horizontal projections, then testing its performance. The attained success rate reached 99.16%, with average recognition time around 0.012 second for re

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
HandWritten Numerals Recognition System
...Show More Authors

  Recognition is one of the basic characteristics of human brain, and also for the living   creatures. It is possible to recognize images, persons, or patterns according to their characteristics. This recognition could be done using eyes or dedicated proposed methods. There are numerous applications for pattern recognition such as recognition of printed or handwritten letters, for example reading post addresses automatically and reading documents or check reading in bank.

      One of the challenges which faces researchers in character recognition field is the recognition of digits, which are written by hand. This paper describes a classification method for on-line handwrit

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
Numeral Recognition Using Statistical Methods Comparison Study
...Show More Authors

The area of character recognition has received a considerable attention by researchers all over the world during the last three decades. However, this research explores best sets of feature extraction techniques and studies the accuracy of well-known classifiers for Arabic numeral using the Statistical styles in two methods and making comparison study between them. First method Linear Discriminant function that is yield results with accuracy as high as 90% of original grouped cases correctly classified. In the second method, we proposed algorithm, The results show the efficiency of the proposed algorithms, where it is found to achieve recognition accuracy of 92.9% and 91.4%. This is providing efficiency more than the first method.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Lark Journal
The problem of synonyms and similar words in the translation of the Holy Quran into Russian (based on the translation by Elmir Kuliev) اشكالية الترادف والكلمات المتقاربة في المعنى في ترجمة القران الكريم الى اللغة الروسية (بناءا على ترجمة إلمير كولييف) Проблема синонимов и близких по значению слов в переводе Священного Корана на русский язык (на материале перевода Эльмира Кулиева)
...Show More Authors

In our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.

Preview PDF
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Strongly (E,F)-convexity with applications to optimization problems
...Show More Authors

In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex. 

View Publication
Crossref (1)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
e*-Extending Modules
...Show More Authors

     This paper aims to introduce the concepts of  -closed, -coclosed, and -extending modules as generalizations of the closed, coclossed, and extending modules,  respectively. We will prove some properties as when the image of the e*-closed submodule is also e*-closed and when the submodule of the e*-extending module is e*-extending. Under isomorphism, the e*-extending modules are closed. We will study the quotient of e*-closed and e*-extending, the direct sum of e*-closed, and the direct sum of e*-extending.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة
Proposed family speech recognition
...Show More Authors

Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.

Publication Date
Thu Apr 06 2023
Journal Name
Materials Science Forum
Study of the Effect of Ce <sup>3+</sup> on the Gas Sensitivity and Magnetic Properties of Cu<sub>x</sub>Ce<sub>0.3-X</sub>Ni<sub>0.7</sub>Fe<sub>2</sub>O<sub>4</sub> Ferrite Nanoparticles
...Show More Authors

This study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref