Preferred Language
Articles
/
jih-2365
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of confidential data. This paper presents a steganography method in frequency domain. Haar Wavelet Transform is applied for decomposition of gray level cover image into four sub-bands. The secret image is hidden in the high frequency HH sub-band after applying the histogram modification followed by scrambling process. A Histogram modification is adopted, to scale the secret image to normalize its values, that manipulates the secret image from bright image to dark. Thus the secret image becomes invisible so it can be hidden in the high frequency sub-band.  Scrambling the positions can be for rows then columns, which will give strong security of the hiding process. The experimental results demonstrate the proposed method has achieved superior performance in terms of quantifiable measurement (PSNR and correlation) and in terms of visual quality. The proposed method propositions good imperceptible results and good response for against the various image attacks.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Differential Transform Methods for Solving Differential Equations with Multiple Delay
...Show More Authors

In this paper, we present an approximate analytical and numerical solutions for the differential equations with multiple delay using the extend differential transform method (DTM). This method is used to solve many linear and non linear problems.

 

View Publication Preview PDF
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Merge Operation Effect On Image Compression Using Fractal Technique
...Show More Authors

Fractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.

View Publication Preview PDF
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
A Survey on Image Caption Generation in Various Languages
...Show More Authors

      The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
FINGERPRINTS MATCHING USING THE ENERGY AND LOW ORDER MOMENT OF HAAR WAVELET SUBBANDS
...Show More Authors

Fingerprint recognition is one among oldest procedures of identification. An important step in automatic fingerprint matching is to mechanically and dependably extract features. The quality of the input fingerprint image has a major impact on the performance of a feature extraction algorithm. The target of this paper is to present a fingerprint recognition technique that utilizes local features for fingerprint representation and matching. The adopted local features have determined: (i) the energy of Haar wavelet subbands, (ii) the normalized of Haar wavelet subbands. Experiments have been made on three completely different sets of features which are used when partitioning the fingerprint into overlapped blocks. Experiments are conducted on

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
2012 Ieee-embs Conference On Biomedical Engineering And Sciences
Compatibility of mother wavelet functions with the electroencephalographic signal
...Show More Authors

View Publication
Scopus (25)
Crossref (20)
Scopus Crossref
Publication Date
Wed Oct 04 2023
Journal Name
Exergy - New Technologies And Applications
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel

... Show More
View Publication
Crossref
Publication Date
Thu Jul 06 2017
Journal Name
Al-mustansiriyah Journal Of Science
Modification the ELISA Kit for diagnosis of Psedudomonas aeruginosa and comparing its with ordinary ELSA Kit
...Show More Authors

Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Modification of Searle’s Speech Act of Promising in its Application to Selected Religious and Political Texts
...Show More Authors

This study presents certain modifications done to the conditions set by Searle
(1969: 57) concerning the speech act of promising in order to render them to selected
sayings of Prophet Muhammad (P.B.U.H.) and Jesus Christ (P.B.U.H.) and to
political texts. These modifications make the conditions of the speech act of
promising appropriate for sincere promises made by the Messengers of God since
they deliver their Messages of God but they are unable, as Messengers, to fulfill
God’s promises which they make as part of their Messages and by representatives of
States who deliver speeches on behalf of their Governments. These are the only two
situations where the speakers can make promises and do not fulfill these prom

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today:proceeding
Modification of CR39 surfaces by 193 nm ArF laser for biomaterial sensing
...Show More Authors

Scopus (3)
Scopus