Preferred Language
Articles
/
jbcd-228
The value of lateral cephalometric image in sex identification
...Show More Authors

Background: Determination of sex and estimation of stature from the skeleton is vital to medicolegal investigations. Skull is composed of hard tissue and is the best preserved part of skeleton after death, hence, in many cases it is the only available part for forensic examination. Lateral cephalogram is ideal for the skull examination as it gives details of various anatomical points in a single radiograph. This study was undertaken to evaluate the accuracy of digital cephalometric system as quick, easy and reproducible supplement tool in sex determination in Iraqi samples in different age range using certain linear and angular craniofacial measurements in predicting sex. Materials and Method The sample consisted of 113of true lateral cephalometric radiographs for adults with age range from 22-43 years old (51 males, 62 females), using certain linear and angular craniofacial measurements with the aid of computer program “AutoCAD 2007” Results: The eleven parameters measured for males and females when compared are statistically significantly different. All cranio-cephalometric measurements gave overall predictive accuracy of sex determination by discriminant analysis (86.7%). The stepwise selection method gave overall predictive accuracy of sex determination by discriminant analysis (85.8%). Age showed no statistical difference among the studied age range except for the distance from Mastoid to Frankfort plane. Conclusion: The lateral cephalometric measurements of craniofacial bones are useful to support sex determination of Iraqi population in forensic radiographic medicine.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Satellite Image Mosaics Using Digital Cosine Transform (DCT) Descriptor
...Show More Authors

In this research work, a modified DCT descriptor are presented to mosaics the satellite images based on Abdul Kareem [1] similarity criterion are presented, new method which is proposed to speed up the mosaics process is presented. The results of applying the modified DCT descriptor are compared with the mosaics method using RMSE similarity criterion which prove that the modified DCT descriptor to be fast and accurate mosaics method.

View Publication Preview PDF
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Effect of Partial Coherence illuminated bar on evaluation technique of diffraction image
...Show More Authors

In this work, we are obviously interested in a general solution for the calculation of the image of a single bar in partially coherent illumination. The solution is based on the theory of Hopkins for the formation of images in optical instruments in which it was shown that for all practical cases, the illumination of the object may be considered as due to a self – luminous source placed at the exit pupil of the condenser , and the diffraction integral describing the intensity distribution in the image of a single bar – as an object with half – width (U0 = 8 ) and circular aperture geometry is viewed , which by suitable choice of the coherence parameters (S=0.25,1.0.4.0) can be fitted to the observed distribution in various types of mi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
An Approximate solution for two points oundary value problem corresponding to some optimal control
...Show More Authors

this paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical

View Publication Preview PDF
Publication Date
Thu Sep 26 2019
Journal Name
Journal Of Pharmaceutical Research International
Synthesis and identification of novel 2-thioxoimidazolidin-4-one derivatives containing azo and ester groups
...Show More Authors

The compounds 3-[4̄-(4˭-methoxybenzoyloxy) benzylideneamino]-2-thioxo-imidazolidine-4-one(3)aand 4-(1-(5-oxo- 2-thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(3)b were prepared from the reaction of aromatic aldehyde or ketone(1)a,bwith thiosemicarbazide to give aryl thiosemicarbazones(2)a,b ,followed by cyclization with ethylchloroacetate in the presence of fused sodium acetate. Treatment the compounds(3)a,bwith 4- hydroxybenzenediazoniumchloride yielded the correspondings4-((4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)methyl)phenyl 4-methoxybenzoate(4)aand4-(1-(4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(4)b.The new 2-thioxo-imidazolidin-4-one with esters (5-7)a,b sy

... Show More
Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Proceedings Of The 5th International Conference On Information Systems Security And Privacy
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref