Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing

... Show More
View Publication
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Emerging Trends Technology In Computer Science
A survey of similarity measures in web image search
...Show More Authors

Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Use some statistical algorithms in mock hacking satellite image
...Show More Authors

In the recent years, remote sensing applications have a great interest because it's offers many advantages, benefits and possibilities for the applications that using this concept, satellite it's one must important applications for remote sensing, it's provide us with multispectral images allow as study many problems like changing in ecological cover or biodiversity for earth surfers, and illustrated biological diversity of the studied areas by the presentation of the different areas of the scene taken depending on the length of the characteristic wave, Thresholding it's a common used operation for image segmentation, it's seek to extract a monochrome image from gray image by segment this image to two region (for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
Al-kindy College Medical Journal
Results and predictive factors for single level L4-5, and L5-S1 disc herniation surgery
...Show More Authors

Background: The disc prolapse is a common condition especially in young adults. Different levels are affected in the lumber region; the L4/L5 disc is more susceptible to longitudinal load and is the most common site of lumbar disc prolapse. The L5/S1 disc is protected from torsion load by strong ilio-lumbar ligaments but it is more susceptible to axial compressive forces. Many factors affect the result and outcome of surgery in these levels.Objective: The aim of this study is to correlate operative data, short-term results, complications, and prognostic factors (age, gender, mobility, hospital stay, and level of pain) for one-level lumber discectomybetween different levels (L4–L5 vs. L5–S1).Methods In this prospective study, 32 patie

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Performance of Case-Based Reasoning Retrieval Using Classification Based on Associations versus Jcolibri and FreeCBR: A Further Validation Study
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one

... Show More
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Interpretation of Mud Losses in Carbonates Based on Cuttings Description, Well-Logging, Seismic and Coherency Data
...Show More Authors

    Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm.

   The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potentia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Biochemical And Cellular Archives
STUDY OF LYSYL OXIDASE-1 AND KIDNEY FUNCTION IN SERA OF IRAQI PATIENTS WITH DIABETIC NEPHROPATHY
...Show More Authors

This study aimed to compare lysyl oxidase-1 level in diabetic patients with and without renal dysfunction, that LOX-1 may be an indicator for the early stage of diabetic nephropathy (DN). In addition to finding it is a relationship with kidney functions in Iraqi diabetic patients with and without renal dysfunction. Blood was obtained from 25 healthy individuals as a control group (G1), 25 diabetic patients with renal dysfunction, and 25 diabetic patients without renal dysfunction. Age range 40-60 years for all subjects. BMI (25-27) Kg/m2 . The serum was used for the analysis of LOX-1, FBG, urea, creatinine and uric acid. Whole blood is used for the determination of HbA1C. Results of FBG and HbA1C revealed a significant increase in G2 and G

... Show More