The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by applying DCT transform on the selected sub band's coefficients, this method focuses on the invisibility for the embedded watermark bits, and the quality for the watermarked image; furthermore it focuses on a subjective for the recovered watermark after extraction stage. The proposed method was evaluated by using simple image quality matrix illustrated in the results, and it was found that the proposed method provide good objective quality, the recovered watermark extracted successfully and the quality of recovered watermark are survived.
An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show MoreImage retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov
... Show MoreThe wide spread of Computer Based Test in the Iraqi universities raised an important concern for some scholars thinking about integrating computers as an academic assessment tool before making big change in the examination systems, that concern is: how the computerized test score is effected in comparison to old paper and pencil . This paper researches whether test scores of Iraqi students varies in the computer, Pencil based tests, sixty-four postgraduate graduates from Iraqi universities. Thirty five female and twenty nine male, all graduated from colleges of science in specializations other than computer science and applying for postgraduate studies in the Iraqi
... Show MoreIn this paper, a single link flexible joint robot is used to evaluate a tracking trajectory control and vibration reduction by a super-twisting integral sliding mode (ST-ISMC). Normally, the system with joint flexibility has inevitably some uncertainties and external disturbances. In conventional sliding mode control, the robustness property is not guaranteed during the reaching phase. This disadvantage is addressed by applying ISMC that eliminates a reaching phase to ensure the robustness from the beginning of a process. To design this controller, the linear quadratic regulator (LQR) controller is first designed as the nominal control to decide a desired performance for both tracking and vibration responses. Subsequently, discontinuous con
... Show MoreThe demarcation in general and maritime borders in particular is an important process between any two states to define their respective regional Borders and their economic resources. This research is focused on the way in which demarcation took place between Iraq's maritime borders on the one hand and the Kuwaiti side on the other. Through satellite technology (Landsat8) and GIS can be identified the area and how the demarcation was done. The most important in addition, positive points of the demarcation have been explained. It was given a full description of the importance of the economic zone and Highlighting Iraq's most important marine facilities. More than one map of Iraq can be integrated and redesigned by GIS. This work has been t
... Show MoreHuman detection represents a main problem of interest when using video based monitoring. In this paper, artificial neural networks, namely multilayer perceptron (MLP) and radial basis function (RBF) are used to detect humans among different objects in a sequence of frames (images) using classification approach. The classification used is based on the shape of the object instead of depending on the contents of the frame. Initially, background subtraction is depended to extract objects of interest from the frame, then statistical and geometric information are obtained from vertical and horizontal projections of the objects that are detected to stand for the shape of the object. Next to this step, two ty
... Show MoreThe research tagged (Digital Collage in Contemporary Art) consisted of four chapters. The first chapter was devoted to the methodological framework of the research. The problem ended with the following questions: How does digital collage represent contemporary art? What is the variable at the level of meaning shifts in composing works according to the digital collage? Was the digital collage a qualitative leap in the path of the aesthetic pattern in art? How does digital collage interfere with contemporary life and societies? It included the aim of the research and its importance, while the second chapter dealt with two topics, the first (reading in the concept of collage), and the second (digital collage). The third chapter was devoted
... Show More