Preferred Language
Articles
/
uxYY0osBVTCNdQwCVuCt
The Effect of Wavelet Coefficient Reduction on Image Compression Using DWT and Daubechies Wavelet Transform
...Show More Authors

FG Mohammed, HM Al-Dabbas, Science International, 2018 - Cited by 2

View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Computer Model Application for Sorting and Grading Citrus Aurantium Using Image Processing and Artificial Neural Network
...Show More Authors
Abstract<p>This study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Gradin</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
The Reduction in the design structure ofThe emblems ofIraqi sports clubs is amodel
...Show More Authors

   Singled current study on the subject of shorthand in structure designs logos (Iraqi sports clubs model), as the current study Tdmt four chapters, was in the first chapter defines the research problem and its significance, as well as the aim of the research in the know shorthand formal in structure designs logos (Iraqi sports clubs model ), and identifies Find time limits: - slogans Iraqi sports clubs for the years (1956 - 1970), because it represented the years to include designs slogans official Iraqi sports clubs that have been elected in this period for the purpose of examining the reality of the design in the current search. And it represented the spatial limits: - the Republic of Iraq - Iraqi slogans designs sports

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The effectiveness of intense pulsed light (home use) device in facial hair reduction
...Show More Authors

Background: Intense pulsed light (IPL) devices produce polychromatic incoherent high-intensity pulsed light with a specified wavelength spectrum, fluence, and pulse duration through the use of flashlamps and bandpass filters. Similar to lasers, IPL devices operate on the selective photothermolysis principle, with melanin acting as the chromophore. Despite this similarity, they are constructed differently and produce different amounts of light

Aim of the study: To investigate the efficacy of IPL home-use device in hair reduction technique for women with unwanted facial hair.

Subjects and methods: The study was conducted in Baghdad on forty-five female subjects with Fitzpatri

... Show More
View Publication
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The effectiveness of intense pulsed light (home use) device in facial hair reduction
...Show More Authors

Background: Intense pulsed light (IPL) devices produce polychromatic incoherent high-intensity pulsed light with a specified wavelength spectrum, fluence, and pulse duration through the use of flashlamps and bandpass filters. Similar to lasers, IPL devices operate on the selective photothermolysis principle, with melanin acting as the chromophore. Despite this similarity, they are constructed differently and produce different amounts of light Aim of the study: To investigate the efficacy of IPL home-use device in hair reduction technique for women with unwanted facial hair. Subjects and methods: The study was conducted in Baghdad on forty-five female subjects with Fitzpatrick skin phototype (II to IV) and black, brown hair in a period of ei

... Show More
View Publication
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
Digital Photo credibility and its reflection on the cognitive process of journalistic image of Viewers: زيـاد طـارق شـــاكر
...Show More Authors

Represent the current study and tagged (the credibility of digital image and its reflection on the process of cognitive picture releases) scientific effort is designed to detect realizing press releases and the extent affected the credibility of the digital image by selecting the relationship between digital photo and the extent of their credibility on the one hand and between the process of cognition and Press Photo of the hand Other than the consequent establishment researcher collects materials to serve the scientific research topic in three chaptersCombine the first one methodological framework for the search of the research problem and its significance and the desired objective be achieved together with the definition of the most im

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
An Image Coding and Embedding Strategy Based on Channel Variations and DNA Sequences
...Show More Authors

The digital multimedia systems become standard at this time because of their extremely sensory activity effects and also the advanced development in its corresponding technology. Recently, biological techniques applied to several varieties of applications such as authentication protocols, organic chemistry, and cryptography. Deoxyribonucleic Acid (DNA) is a tool to hide the key information in multimedia platforms.
In this paper, an embedding algorithm is introduced; first, the image is divided into equally sized blocks, these blocks checked for a small amount color in all the separated blocks. The selected blocks are used to localize the necessary image information. In the second stage, a comparison is between the initial image pixel

... Show More
View Publication Preview PDF