Preferred Language
Articles
/
jih-2365
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of confidential data. This paper presents a steganography method in frequency domain. Haar Wavelet Transform is applied for decomposition of gray level cover image into four sub-bands. The secret image is hidden in the high frequency HH sub-band after applying the histogram modification followed by scrambling process. A Histogram modification is adopted, to scale the secret image to normalize its values, that manipulates the secret image from bright image to dark. Thus the secret image becomes invisible so it can be hidden in the high frequency sub-band.  Scrambling the positions can be for rows then columns, which will give strong security of the hiding process. The experimental results demonstrate the proposed method has achieved superior performance in terms of quantifiable measurement (PSNR and correlation) and in terms of visual quality. The proposed method propositions good imperceptible results and good response for against the various image attacks.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Cogent Engineering
Content-based image retrieval: A review of recent trends
...Show More Authors

View Publication
Scopus (76)
Crossref (69)
Scopus Clarivate Crossref
Publication Date
Thu Aug 22 2019
Journal Name
Separation Science And Technology
Modification of Langmuir model for simulating initial pH and temperature effects on sorption process
...Show More Authors

Scopus (38)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Feature Extraction of Human Facail Expressions Using Haar Wavelet and Neural network
...Show More Authors

One of the challenging and active research topics in the recent years is Facial Expression. This paper presents the method to extract the features from the facial expressions from still images. Feature extraction is very important for classification and recognition process. This paper involve three stages which contain capture the images, pre-processing and feature extractions. This method is very efficient in feature extraction by applying haar wavelet and Karhunen-Loève Transform (KL-T). The database used in this research is from Cohen-Kanade which used six expressions of anger, sadness fear, happiness, disgust and surprise. Features that have been extracted from the image of facial expressions were used as inputs to the neural networ

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Comparison between Radial Basis Function and Wavelet Basis Functions Neural Networks
...Show More Authors

      In this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented

View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Mon Nov 14 2022
Journal Name
Physica Scripta
A wavelet-based collocation technique to find the discontinuous heat source in inverse heat conduction problems
...Show More Authors
Abstract<p>This paper is devoted to an inverse problem of determining discontinuous space-wise dependent heat source in a linear parabolic equation from the measurements at the final moment. In the existing literature, a considerably accurate solution to the inverse problems with an unknown space-wise dependent heat source is impossible without introducing any type of regularization method but here we have to determine the unknown discontinuous space-wise dependent heat source accurately using the Haar wavelet collocation method (HWCM) without applying the regularization technique. This HWCM is based on finite-difference and Haar wavelets approximation to the inverse problem. In contrast to othe</p> ... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
modification of polystyrene co butadiene
...Show More Authors

During this research accomplish some chemical modifications on the Poly for new modified polymers with Kimaaaúah qualities, physical and unexpected new applications that the first of these chemical modifications that was completed is the introduction of a poly styrene butadiene swash and then this group

View Publication Preview PDF
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More