Preferred Language
Articles
/
kBfIvY0BVTCNdQwCkxqE
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key, secondly selected the block number and slice number, thirdly, the low-high band used for embedding after adding the generated number, fourthly, used the Hessenberg transform on the blocks that portioned the band (low-high) in a specific size. The secret information (image or text) is a binary value. It was embedded by setting the positive value in the diagonal to odd values if the embedded is one and setting it to even if the secret bit is zero. Several tests were applied, such as applying mean square error, peak signal to noise ratio PSNR, and structural similarity index measure SSIM. Some analyses such as adding noise, scaling, and rotation analysis are applied to test the efficiency. The results of the tests showed the strength of the proposed method.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
THE MENTAL IMAGE OF THE IRAQI PUBLIC CONCERNING THE HOUSE OF REPRESENTATIVES: (Section I)
...Show More Authors

This research is a result of other studies made about the iraqi public and its relationship with different states institutions, until recently, such studies were almost non-existent. The main characteristic that distinguishes scientific research is that it involves a specific problem that needs to be studied and analysed from multiple aspects. What is meant by identifying the problem, is to limit the topic to what the researcher wants to deal with, rather than what the title suggests as topics which the researcher doesn’t want to deal with. The problem of this research is the absence of thoughtful and planned scientific programs to build a positive mental image of the institutions of the modern state in general and the House of Represe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Experimental Investigation Utilizing Thermal Image Technique to the Heat Transfer Enhancement Using Oscillated Fins
...Show More Authors

Heat transfer around a flat plate fin integrated with piezoelectric actuator used as oscillated fin in laminar flow has been studied experimentally utilizing thermal image camera. This study is performed
for fixed and oscillated single and triple fins. Different substrate-fin models have been tested, using fins of (35mm and 50mm) height, two sets of triple fins of (3mm and 6mm) spacing and three frequencies
applied to piezoelectric actuator (5, 30 and 50HZ). All tests are carried out for (0.5 m/s and 3m/s) in subsonic open type wind tunnel to evaluate temperature distribution, local and average Nusselt number (Nu) along the fin. It is observed, that the heat transfer enhancement with oscillation is significant compared to without o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Astronomi cal Color Image Compression Using Multilevel Block Truncation Coding –Modified Vector Quantization Technique
...Show More Authors

A common approach to the color image compression was started by transform
the red, green, and blue or (RGB) color model to a desire color model, then applying
compression techniques, and finally retransform the results into RGB model In this
paper, a new color image compression method based on multilevel block truncation
coding (MBTC) and vector quantization is presented. By exploiting human visual
system response for color, bit allocation process is implemented to distribute the bits
for encoding in more effective away.
To improve the performance efficiency of vector quantization (VQ),
modifications have been implemented. To combines the simple computational and
edge preservation properties of MBTC with high c

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map
...Show More Authors

    Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Lineament automatic extraction analysis for Galal Badra river basin using Landsat 8 satellite image
...Show More Authors

This research including lineament automated extraction by using PCI Geomatica program, depending on satellite image and lineament analysis by using GIS program. Analysis included density analysis, length density analysis and intersection density analysis. When calculate the slope map for the study area, found the relationship between the slope and lineament density.
The lineament density increases in the regions that have high values for the slope, show that lineament play an important role in the classification process as it isolates the class for the other were observed in Iranian territory, clearly, also show that one of the lineament hit shoulders of Galal Badra dam and the surrounding areas dam. So should take into consideration

... Show More
View Publication Preview PDF
Crossref (13)
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
L`image du héros romantique dans: Un Barrage Contre Le Pacifique et L`Amant
...Show More Authors

Dans le roman moderne, le type du héros est depuis longtemps devenu suspect.  Il risque même de disparaitre dans ce qu´on désigne le Nouveau Roman qui, se concentrant plutôt sur les objets, décrits minutieusement, refuse la fonction épistémologique traditionnelle de la littérature. Cette conception se manifeste, sur le plan formel, par certains traits typiques, comme la relativisation des points de vue, la décomposition de l´action, la destruction du temps, la décomposition de l´espace et la désintégration du personnage romanesque dont les liens avec la société sont coupés.

View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
The poetry of the sensory image of Ibn Dannir al-Musli poems (B627 H.)
...Show More Authors

تُعبّرُ الصُّورةُ الحسَّيةُ في شعرِ ابن دُنَينير الموصليِّ([i]) في بنيتها عن تجربةِ الشاعرِ الوجدانيةِ والذهنيةِ, وأفكارهِ ومشاعرِهِ؛ فيصوغُ بها مَفهومًا جديدًا للواقعِ الماديِّ والمعنويِّ، الذي يتسمُ بالوضوحِ أولاً، وبالقرْبِ من الذهنِ ثانيًا، للربْطِ بين الحواسِّ الإنسانيةِ والمعاني الذهنيةِ، لِتُقَدِّمَ الصُّورةُ الحسيَّةُ إلى ((المتلقي صُورًا مرئيةً، يُعادُ تشكيلُها سياق

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key
...Show More Authors

Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Car Logo Image Extraction and Recognition using K-Medoids, Daubechies Wavelets, and DCT Transforms
...Show More Authors

     Recognizing cars is a highly difficult task due to the wide variety in the appearance of cars from the same car manufacturer. Therefore, the car logo is the most prominent indicator of the car manufacturer. The captured logo image suffers from several problems, such as a complex background, differences in size and shape, the appearance of noise, and lighting circumstances. To solve these problems, this paper presents an effective technique for extracting and recognizing a logo that identifies a car. Our proposed method includes four stages: First, we apply the k-medoids clustering method to extract the logo and remove the background and noise. Secondly, the logo image is converted to grayscale and also converted to a binary imag

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref