Like the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Signal Noise Ratio (PSNR) and Mean Squared Error (MSE) that apply to one of the set cover images were 68.74 and 0.093, respectively.
The reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5- dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2- azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and Hg(II)] has been i
... Show MoreThe nuclear ground-state structure of some Nickel (58-66Ni) isotopes has been investigated within the framework of the mean field approach using the self-consist Hartree-Fock calculations (HF) including the effective interactions of Skyrme. The Skyrme parameterizations SKM, SKM*, SI, SIII, SKO, SKE, SLY4, SKxs15, SKxs20 and SKxs25 have been utilized with HF method to study the nuclear ground state charge, mass, neutron and proton densities with the corresponding root mean square radii, charge form factors, binding energies and neutron skin thickness. The deduced results led to specifying one set or more of Skyrme parameterizations that used to achieve the best agreement with the available experimental
... Show MoreRecently The problem of desertification and vegetation cover degradation become an environmental global challenge. This problem could be summarized as as the land cover changes. In this paper, the area of Al- Muthana in the south of Iraq will be consider as one of Semi-arid lands. For this purpose, the Ladsat-8 images can be used with 15 m in spatial resolution. In order to over Achieve the work, many important ground truth data must be collected such as, rain precipitation, temperature distribution over the seasons, the DEM of the region, and the soil texture characteristics. The extracted data from this project are tables, 2-D figures, and GIS maps represent the distributions of vegetation area
... Show MoreThe detection and estimation of weathering conditions have become a very important daily necessity in our life. For this purpose, several satellites of low resolution imagery were launched by the weathering and environmental agencies. The important weather paremeters are temperuter, wind direction, velocity, clould and humidity, etc. The low resolution images often deal with large-scale phenomena and the interpretation and projection of the produced data requires continuous development of tools and criteria. In this paper, the low spatial resolution data generated by the moderate resolution imaging spectroradiometer (MODIS) were used to monitor the cloud density and direction above Iraq and i
... Show MoreThe conjugate coefficient optimal is the very establishment of a variety of conjugate gradient methods. This paper proposes a new class coefficient of conjugate gradient (CG) methods for impulse noise removal, which is based on the quadratic model. Our proposed method ensures descent independent of the accuracy of the line search and it is globally convergent under some conditions, Numerical experiments are also presented for the impulse noise removal in images.
Medical image segmentation is a frequent processing step in image medical understanding and computer aided diagnosis. In this paper, development of range operator in image segmentation is proposed depending on dermatology infection. Three different block sizes have been utilized on the range operator and the developed ones to enhance the behavior of the segmentation process of medical images. To exploit the concept of range filtering, the extraction of the texture content of medical image is proposed. Experiment is conducted on different medical images and textures to prove the efficacy of our proposed filter was good results.
Recently The problem of desertification and vegetation cover degradation become an environmental global challenge. This problem could be summarized as as the land cover changes. In this paper, the area of Al- Muthana in the south of Iraq will be consider as one of Semi-arid lands. For this purpose, the Ladsat-8 images can be used with 15 m in spatial resolution. In order to over Achieve the work, many important ground truth data must be collected such as, rain precipitation, temperature distribution over the seasons, the DEM of the region, and the soil texture characteristics. The extracted data from this project are tables, 2-D figures, and GIS maps represent the distributions of vegetation areas, evaporation / precipitation, river levels
... Show MoreLK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More