In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was shown upon attempting different attacks, such as histogram equalization,
double winner filtering and scaling.
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that
Gypseous soil is prevalent in arid and semi-arid areas, is from collapsible soil, which contains the mineral gypsum, and has variable properties, including moisture-induced volume changes and solubility. Construction on these soils necessitates meticulous assessment and unique designs due to the possibility of foundation damage from soil collapse. The stability and durability of structures situated on gypseous soils necessitate close collaboration with specialists and careful, methodical preparation. It had not been done to find the pattern of failure in the micromechanical behavior of gypseous sandy soil through particle image velocity (PIV) analysis. This adopted recently in geotech
This paper seeks to study the link between the fundamentalist evidence based on the observance of governance and interests and the ranks of the three legitimate purposes (necessary, need and detailed). The researcher followed the descriptive-analytical approach. The study reached important results, including that the measurement relates to the three ranks, but predominantly attached to measure the meaning of the need and the need, and the measurement of the semi-formal and semi-predominance improvement. Reclamation is considered by the majority of scholars to be authentic if it is related to the necessity and the need, and that it is not acceptable to improve only by a witness who recommends it. The excuses relate to Hajji and Tahini, no
... Show MoreSamples of gasoline engine oil (SAE 5W20) that had been exposed to various oxidation times were inspected with a UV-Visible (UV-Vis) spectrophotometer to select the best wavelengths and wavelength ranges for distinguishing oxidation times. Engine oil samples were subjected to different thermal oxidation periods of 0, 24, 48, 72, 96, 120, and 144 hours, resulting in a range of total base number (TBN) levels. Each wavelength (190.5 – 849.5 nm) and selected wavelength ranges were evaluated to determine the wavelength or wavelength ranges that could best distinguish among all oxidation times. The best wavelengths and wavelength ranges were analyzed with linear regression to determine the best wavelength or range to predict oxidation t
... Show MoreThe rhetoric is concerned with the expressive emphasis of things, the science of the statement takes the treatment of graphic images and rhetorical fiction, and in the science of the exquisite dealing with the study of verbal and moral improvements, and in the science of meanings took all related to compositions and methods, and these vocabulary entered into the field of art and its branches largely, especially in the uncle and art of design because it has a major role in including a lot of biological functions with a deep meaning of its comprehensiveness on the multiplicity of real meanings characterized by suggestive and important and semantics refer to the recipient in the research to refer to the recipient The discovery of the intern
... Show More