Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Effect Of Time Driven Activity Based Costing in Pricing Decisions
...Show More Authors

The research aims to demonstrate the impact of TDABC as a strategic technology compatible with the rapid developments and changes in the contemporary business environment) on pricing decisions. As TDABC provides a new philosophy in the process of allocating indirect costs through time directives of resources and activities to the goal of cost, identifying unused energy and associated costs, which provides the management of economic units with financial and non-financial information that helps them in the complex and dangerous decision-making process. Of pricing decisions. To achieve better pricing decisions in light of the endeavor to maintain customers in a highly competitive environment and a variety of alternatives, the resear

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Accuracy Evaluation of Digital Elevation Model Created Using Handheld Global Positioning System Receivers
...Show More Authors

This study aims to assess the accuracy of digital elevation model (DEM) created with utilization of handheld Global Positioning System (GPS) and comparing with Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. It is known that the quality of the DEM is affected by both of accuracy of elevation at each pixel (absolute accuracy) and accuracy of presented morphology (relative accuracy). The University of Baghdad, Al Jadriya campus was selected as a study area to create and analysis the resulting DEM. Additionally, Geographic Information System (GIS) was used to visualize, analyses and interpolate GPS track points (elevation data) of the study area. In this

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Multiwavelet based-approach to detect shared congestion in computer networks
...Show More Authors

Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Kernel estimation of returns of retirement funds of employers based on monetary earnings (subscriptions and compensation) via regression discontinuity in Iraq
...Show More Authors

Regression Discontinuity (RD) means a study that exposes a definite group to the effect of a treatment. The uniqueness of this design lies in classifying the study population into two groups based on a specific threshold limit or regression point, and this point is determined in advance according to the terms of the study and its requirements. Thus , thinking was focused on finding a solution to the issue of workers retirement and trying to propose a scenario to attract the idea of granting an end-of-service reward to fill the gap ( discontinuity point) if it had not been granted. The regression discontinuity method has been used to study and to estimate the effect of the end -service reward on the cutoff of insured workers as well as t

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 31 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
AN ENHANCED EVOLUTIONARY ALGORITHM WITH LOCAL HEURISTIC APPROACH FOR DETECTING COMMUNITY IN COMPLEX NETWORKS
...Show More Authors

Preview PDF
Scopus (5)
Scopus
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Channel Estimation and Prediction Based Adaptive Wireless Communication Systems
...Show More Authors

Wireless channels are typically much more noisy than wired links and subjected to fading due to multipath  propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.

In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Synthesis and Spectral Studies of ZnII,CdII and HgII Complexes with 5-(2-Benzoic acid azo)-8-hydroxy quinoline Ligand
...Show More Authors

Coupling reaction of 2-amino benzoic acid with 8-hydroxy quinoline gave bidentate azo ligand. The prepared ligand has been identified by Microelemental Analysis,1HNMR,FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (ZnII,CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes have been characterized by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Synthesis and Spectral Studies of ZnII,CdII and HgII Complexes with 5-(2-Benzoic acid azo)-8-hydroxy quinoline Ligand
...Show More Authors

Coupling reaction of 2-amino benzoic acid with 8-hydroxy quinoline gave bidentate azo ligand. The prepared ligand has been identified by Microelemental Analysis,1HNMR,FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (ZnII,CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes have been characterized by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range

... Show More
Preview PDF
Publication Date
Thu May 17 2012
Journal Name
Baghdad Science Journal
Synthesis and Spectral Studies of ZnII,CdII and HgII Complexes with 5-(2-Benzoic acid azo)-8-hydroxy quinoline Ligand
...Show More Authors

Coupling reaction of 2-amino benzoic acid with 8-hydroxy quinoline gave bidentate azo ligand. The prepared ligand has been identified by Microelemental Analysis,1HNMR,FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (ZnII,CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes have been characterized by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range

... Show More
Preview PDF