Preferred Language
Articles
/
ijs-6754
Satellite Image Classification using Spectral Signature and Deep Learning
...Show More Authors

    When images are customized to identify changes that have occurred using techniques such as spectral signature, which can be used to extract features, they can be of great value. In this paper, it was proposed to use the spectral signature to extract information from satellite images and then classify them into four categories. Here it is based on a set of data from the Kaggle satellite imagery website that represents different categories such as clouds, deserts, water, and green areas. After preprocessing these images, the data is transformed into a spectral signature using the Fast Fourier Transform (FFT) algorithm. Then the data of each image is reduced by selecting the top 20 features and transforming them from a two-dimensional matrix to a one-dimensional vector matrix using the Vector Quantization (VQ) algorithm. The data is divided into training and testing. Then it is fed into 23 layers of deep neural networks (DNN) that classify satellite images. The result is 2,145,020 parameters, and the evaluation of performance measures was accuracy = 100%, loopback = 100%, and the result F1 = 100 %.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Content-Based Cartoon Image Retrieval
...Show More Authors

Publication Date
Fri May 29 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Image Fusion Techniques: A Review
...Show More Authors

Image Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Orthogonal polynomial embedded image kernel
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Aug 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Watermarking for Mobile Device
...Show More Authors

The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore,  the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of  the mobile network and its wide usage through  different types  of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Polynomial image compression: A review
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Image Segmentation for Skin Detection
...Show More Authors

Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Visual image in Farzdaq hair
...Show More Authors

The research shows that the visual image plays an important role when Farzdaq in the issue of aesthetic perception, it enables him to feel a sense of artistic and mental perception to raise astonishment and admiration through his ability to link the optics through the suggestive image to carry us to a new vision imagined full of visual images.

View Publication Preview PDF
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 09 2019
Journal Name
Journal Of Global Pharma Technology
Synthesis, characterization, spectral of azo dyes ligands complexes with Rh(III) and La(III) and studies their industrial and bacterial application
...Show More Authors

1-[4-(2-Hydroxy-4, 6-dimethyl-phenylazo)-phenol]-ethanone (HL1) and 2-(4-methoxy-phenylazo)-3, 5- dimethyl-phenol (HL2) were produced by combination the diazonium salts of amines with 3, 5- dimethylphenol. The geometry of azo compounds was resolved on the basis of (C.H.N) analyses, 1H and 13CNMR, FT-IR and UV-Vis spectroscopic mechanisms. Complexes of La (III) and Rh (III) have been performed and depicted. The formation of complexes has been identified by using elemental analysis, FTIR and UV-Vis spectroscopic process as well, conductivity molar quantifications. Nature of complexes produced have been studied obeyed mole ratio and continuous alteration ways, Beer's law followed through a concentration scope (1×10-4 - 3×10-4 M). High molar

... Show More