Preferred Language
Articles
/
ijs-6046
Techniques and Challenges for Generation and Detection Face Morphing Attacks: A Survey
...Show More Authors

      Face recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of  persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit images in a form of a document or via the Internet, and this allows applicants to manipulate the images to produce morphing images. These photos allow both beneficial and harmful partners to cross borders using the same passport. This is considered a major threat to the security systems that allow them to travel without revealing their true identity. This paper aims to provide a comprehensive overview of face morphing attacks and the development taking place in this specialty. This paper describes the techniques for generating metamorphic images and challenges they face, in addition to the advantages and disadvantages of these techniques. It also dealt with types of techniques used in detecting and determining the attack of mutant faces in the field of deep learning or machine learning, in addition to the laws and criteria for measuring the efficiency of the algorithms used. It provides a general summary of the work that has been produced in this field.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Microbiological Quality of Wheat Cultivated in Many Different Regions of Iraq
...Show More Authors

Microbiological quality (total plate count, yeast and molds, coliform, and E. coli) of wheat cultivated in seven provinces of Iraqi were determined and compared to  Standard Quality of Iraq (IQS) and to the standardization of Food and Drug Administration (FDA). The samples were collected from fields, and some samples taken from near of a street (reachable by people) and far of a street as well as rural fields. The regulation has two limits, which are good and acceptable limits, and the samples within the acceptable limit should be two samples of five. The results showed that all analyzed samples were within the acceptable limit that approved by IQS and FDA. There was one field exceed IQS regulation and there were several fi

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Vitamin E Level In Friedreich’s Ataxic Phenotype Patients In Four Major Hospitals In Baghdad
...Show More Authors

Background: Friedreich ataxia (FRDA) is the most common form of inherited ataxia, comprising one-half of all hereditary ataxias with a carrier rate between 1 in 60 to 1 in 90 and with a disease prevalence of 1 per 29,000. It can occur in two forms the classic form or in association with a vitamin E dependent ataxia. The precise role of Vitamin E in the nervous system is unknown; An Oxidative attack is suspected to play a role in Ataxia with Vitamin E deficiency, as well as in Friedreich ataxia. Vitamin E is the major free-radical-trapping antioxidant.

Objective: Theobjectives of the study is to asses vitamin E level in patients with Friedreichs ataxia phenotype in Iraqi patients.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Studying Hueckel Edge Detector Using Binary Step Edge Image
...Show More Authors

Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.  

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Recognition of Off-line Printed Arabic Text Using Hidden Markov Models
...Show More Authors

In this paper, we introduce a method to identify the text printed in Arabic, since the recognition of the printed text is very important in the applications of information technology, the Arabic language is among a group of languages with related characters such as the language of Urdu , Kurdish language , Persian language also the old Turkish language " Ottoman ", it is difficult to identify the related letter because it is in several cases, such as the beginning of the word has a shape and center of the word has a shape and the last word also has a form, either texts in languages where the characters are not connected, then the image of the letter one in any location in the word has been Adoption of programs ready for him A long time.&

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 10 2022
Journal Name
Iraqi Journal Of Science
Iris Outer Boundary Localization Based on Leading Edge Technique
...Show More Authors

In recent years, the iris biometric occupies a wide interesting when talking about
biometric based systems, because it is one of the most accurate biometrics to prove
users identities, thus it is providing high security for concerned systems. This
research article is showing up an efficient method to detect the outer boundary of
the iris, using a new form of leading edge detection technique. This technique is
very useful to isolate two regions that have convergent intensity levels in gray scale
images, which represents the main issue of iris isolation, because it is difficult to
find the border that can separate between the lighter gray background (sclera) and
light gray foreground (iris texture). The proposed met

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Re-evaluation of lunation of the activity of somantibacterial drugs against clinical isolates of Escherichia coli in al- najaf al- ashref governorate
...Show More Authors

ackground: Escherichia coli is one of the most
important bacterial pathogen that can cause several
disease to human being . In our study we try to
investigate the sensitivity resistance pattern of
Escherichia coli against three antibiotics ( Amikacin,
Nalidixic acid and Cephalexin).
Methods: For this purpose we collected 51 clinical
isolates of Escherichia coli from stool and urine of
outpatient and inpatient patients from different wards
of AL-SADER Teaching Hospital in AL-NAJAF
AL-ASHRAf, IRAQ, and tested by culture and
sensitivity test .
Results: The results appeared that Amikacin show
the highest percentage of sensitivity ( 66.66 % ) ,
while Cephalexin show the lowest percentage of
sensiti

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 25 2022
Journal Name
Iraqi Journal Of Science
Application Voting System of Web based in Iraq
...Show More Authors

Currently voting process is paper based form, by using voting card or paper; thus the counting method is done manually, which exhausts a lot of time. Obsolete votes may be possibly occurring. This paper introduced a system in which voting and counting is done with the help of computer. The election process would be easier, it saves time, avoid errors while counting and obsolete votes are reduced. Electronic voting (E-voting) system is a voting system in which the election related data is stored and handled digitally, it would become the quickest, cheapest, and the most efficient way to administer election and count vote it is considered a means to further enhance and strengthen the democratic processes in modern information societies. Th

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
The impact of e-learning on the cognitive level in the Corona crisis: أسماء غازي عبد
...Show More Authors

E-learning is a necessity imposed by the Corona pandemic, which has disrupted various educational institutions in the world, but some of these institutions have not been affected and education has continued with them, due to their flexible educational system that was able to employ technology in the continuity of the educational process in the so-called e-learning, because It has characteristics that make it the most suitable alternative to avoid the consequences of the Corona pandemic and its damage to the educational process, as e-learning is one of the modern methods that contribute to enhancing the effectiveness of the learner, and enabling him to assume greater responsibility compared to traditional education, so the learner becomes

... Show More
View Publication Preview PDF
Crossref