Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
The Use Of Genetic Algorithm In Estimating The Parameter Of Finite Mixture Of Linear Regression
...Show More Authors

The estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To

... Show More
View Publication
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Estimate the Parallel System Reliability in Stress-Strength Model Based on Exponentiated Inverted Weibull Distribution
...Show More Authors
Abstract<p>In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (<italic>R<sub>k</sub> </italic>) contain <italic>K<sup>th</sup> </italic> parallel components in the stress-strength model, when the stress and strength are independent and non-identically random variables and they follow two parameters Exponentiated Inverted Weibull Distribution (EIWD). Comparisons among the proposed estimators were presented depend on simulation established on mean squared error (MSE) criteria.</p>
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
A training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students
...Show More Authors

       The current research aims to build a training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students. To achieve the objectives of the research, the following hypothesis was formulated:

   There is no statistically significant difference at (0.05) level of significance between the average grades of the students participating in the training program according to the knowledge economy and the average grades of the students who did not participate in the training program in the test of productive thinking. The study sample consisted of (288) second intermediate grade students divided into (152) for the control group

... Show More
View Publication Preview PDF
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Rationalization of costs by using the tool of the quality function deployment: / applied research in the State Company for Textile and Leather Industries
...Show More Authors

The research aims to apply one of the techniques of management accounting, which is the technique of the quality function deployment on the men's leather shoe product Model (79043) in the General Company for Textile and Leather Industries by determining the basic requirements of the customer and then designing the characteristics and specifications of the product according to the preferences of the customer in order to respond to the customer's voice in agreement With the characteristics and technical characteristics of the product, taking into account the products of the competing companies to achieve the maximum customer satisfaction, the highest quality and the lowest costs. Hence, the importance of research has emerged, which indicat

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Al-mustansiriyah Journal Of Science
Encrypting a Text by Using Affine Cipher and Hiding it in the Colored Image by Using the Quantization stage
...Show More Authors

ST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013

View Publication
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
Function of Urban Space in strengthen social interaction through Time
...Show More Authors

problem of the research is the decline of the role of urban space with time as an influential system in societal relations. The research aims to define indicators for achieving social interaction in the city, and to determine indicators for achieving integration in the urban space, and to study the relationship between the integration of urban space and community interaction over time. the research assumed that by distinguishing the social interaction space from the urban space and developing urban spaces in order to be truly interactive spaces, this will help us achieve social interaction and build a positive relationship between them, which enables us to achieve integration within the urban spaces leading to social interaction. Because

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Variable length error correcting code for image in OFDM and PAPR reduction
...Show More Authors

Data <span>transmission in orthogonal frequency division multiplexing (OFDM) system needs source and channel coding, the transmitted data suffers from the bad effect of large peak to average power ratio (PAPR). Source code and channel codes can be joined using different joined codes. Variable length error correcting code (VLEC) is one of these joined codes. VLEC is used in mat lab simulation for image transmission in OFDM system, different VLEC code length is used and compared to find that the PAPR decreased with increasing the code length. Several techniques are used and compared for PAPR reduction. The PAPR of OFDM signal is measured for image coding with VLEC and compared with image coded by Huffman source coding and Bose-

... Show More
View Publication
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref