Like the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Signal Noise Ratio (PSNR) and Mean Squared Error (MSE) that apply to one of the set cover images were 68.74 and 0.093, respectively.
Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show MoreThe research shows that the visual image plays an important role when Farzdaq in the issue of aesthetic perception, it enables him to feel a sense of artistic and mental perception to raise astonishment and admiration through his ability to link the optics through the suggestive image to carry us to a new vision imagined full of visual images.
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
The subject of marketing culture and mental image is one of the important topics in the field of management. There is no study that combines these two variables. The research is important because of the increasing importance of the subject. The future direction of the company in question will support the company's economic and marketing responsibilities. And reflect the company's mental image, as a culture that contributes to changing the reality of the organization investigated by polling the views of a sample of managers in the General Company for Vegetable Oil Industry, which (30) out of the (65) individual, and There are two hypotheses of research: There is a significant
... Show MoreE-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreAs usage of internet grows in different applications around the world, many techniques were developed to guard an important data against from illegal access and modification from unauthorized users by embedding this data into visual media called host media. Audio hiding in an image is a challenge because of the large size of the audio signal. Some previous methods have been presented to reduce the data of the audio signal before embedding it in the cover image, however, these methods was at the cost of reducing the quality of the audio signal. In this paper, a Slantlet transform (SLT) based method is applied to obtain better performance in terms of audio quality. In addition, the data hiding scheme in the cover color image has been imple
... Show MorePM3 semiempirical method and Density Functional Theory (DFT) calculations of the type (B3LYP) and a Gaussian basis set (6-311G) were carried out for fullerene C60 molecule with its construction units (5radialene, 1,2,3-trimethylene indan, and corannulene), to evaluate the geometrical structure (bond lengths, symmetry, and energetic such as heat of formation ΔH0f, total energy Etot., dipole moment μ, EHOMO (highest occupied molecular orbital energy), ELUMO (lowest unoccupied molecular orbital energy), energy gap ΔEHOMO-LUMO), the distribution of electron density and vibration frequencies, all at their equilibrium geometries. Assignment of the vibrations modes was done according to the movement of the atoms as a result of DFT calculatio
... Show MoreThe corrosion inhibiting properties of the new furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione in acidic solution (1.0 M HCl) were explored utilizing electrochemical, surface morphology (AFM), and quantum chemical calculations approaches. The novel furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione shows with an inhibitory efficiency value of 99.4 percent at 150 ppm, carbon steel corrosion in acidic medium is effectively inhibited, according to the results. The influence of temperature on corrosion prevention was studied using adsorption parameters and activation thermodynamics. The novel furan derivative creates a protective layer over the metallic surfa
... Show MorePM3 semiempirical method and Density Functional Theory (DFT) calculations of the type (B3LYP) and a Gaussian basis set (6-311G) were carried out for fullerene C60 molecule with its construction units (5radialene, 1,2,3-trimethylene indan, and corannulene), to evaluate the geometrical structure (bond lengths, symmetry, and energetic such as heat of formation ΔH0f, total energy Etot., dipole moment μ, EHOMO (highest occupied molecular orbital energy), ELUMO (lowest unoccupied molecular orbital energy), energy gap ΔEHOMO-LUMO), the distribution of electron density and vibration frequencies, all at their equilibrium geometries. Assignment of the vibrations modes was done according to the movement of the atoms as a result of DFT calculatio
... Show More