Preferred Language
Articles
/
whdmNo8BVTCNdQwC9WKw
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covered image pixel (after text hiding) was perfectly match the original image pixels through the use of well-known quantify error metrics like rote mean square MSE and signal to noise ratio PSNR measurements. The experimental results are showed in table for various text sizes to the same cover image. Two digital images types (i.e., low and high details) were used in system evaluation.

View Publication
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Evaluation Tv- Image Quality for Different Cable Signal Transmission Resistance Based on Contrast Edge Algorithm
...Show More Authors

Some degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Effect of laser energy and pulses on size and concentration of gold nanoparticles in DDDW by LALP method
...Show More Authors

The size and the concentration of the gold nanoparticles (GNPs)
synthesized in double distilled deionized water (DDDW) have been
found to be affected by the laser energy and the number of pulses.
The absorption spectra of the nanoparticles DDDW, and the
surface plasmon resonance (SPR) peaks were measured, and found to
be located between (509 and 524)nm using the UV- Vis
spectrophotometer. SPR calculations, images of transmission
electron microscope, and dynamic light scattering (DLS) method
were used to determine the size of GNPs, which found to be ranged
between (3.5 and 27) nm. The concentrations of GNPs in colloidal
solutions found to be ranged between (37 and 142) ppm, and
measured by atomic absorptio

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
IMPROVED IMAGE COMPRESSION BASED WAVELET TRANSFORM AND THRESHOLD ENTROPY
...Show More Authors

In this paper, a method is proposed to increase the compression ratio for the color images by
dividing the image into non-overlapping blocks and applying different compression ratio for these
blocks depending on the importance information of the block. In the region that contain important
information the compression ratio is reduced to prevent loss of the information, while in the
smoothness region which has not important information, high compression ratio is used .The
proposed method shows better results when compared with classical methods(wavelet and DCT).

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Cogent Engineering
Content-based image retrieval: A review of recent trends
...Show More Authors

View Publication
Scopus (105)
Crossref (94)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparing the Sequential Nonlinear least squared Method and Sequential robust M method to estimate the parameters of Two Dimensional sinusoidal signal model:
...Show More Authors

Estimation of the unknown parameters in 2-D sinusoidal signal model can be considered as important and difficult problem. Due to the difficulty to find estimate of all the parameters of this type of models at the same time, we propose sequential non-liner least squares method and sequential robust  M method after their development through the use of sequential  approach in the estimate suggested by Prasad et al to estimate unknown frequencies and amplitudes for the 2-D sinusoidal compounds but depending on Downhill Simplex Algorithm in solving non-linear equations for the purpose of obtaining non-linear parameters estimation which represents frequencies and then use of least squares formula to estimate

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al- Haitham Journal For Pure And Applied Sciences
Polymer Chain Reaction (PCR): Principle and Applications
...Show More Authors

The new, standard molecular biologic system for duplicating DNA enzymatically devoid of employing a living organism, like E. coli or yeast, represents polymerases chain reaction (PCR). This technology allows an exponential intensification of a minor quantity of DNA molecule several times. Analysis can be straightforward with more DNA available. A thermal heat cycler performs a polymerization chain reaction that involves repeated cycles of heating and cooling the reactant tubes at the desired temperature for each reaction step. A heated deck is positioned on the upper reaction tube to avoid evaporating the reaction mixture (normally volumes range from 15 to 100 l per tube), or an oil layer can be placed on a reaction mixture su

... Show More
View Publication
Crossref
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Polymer Chain Reaction (PCR): Principle and Applications
...Show More Authors

The new, standard molecular biologic system for duplicating DNA enzymatically devoid of employing a living organism, like E. coli or yeast, represents polymerases chain reaction (PCR). This technology allows an exponential intensification of a minor quantity of DNA molecule several times. Analysis can be straightforward with more DNA available.

A thermal heat cycler performs a polymerization chain reaction that involves repeated cycles of heating and cooling the reactant tubes at the desired temperature for each reaction step. A heated deck is positioned on the upper reaction tube to avoid evaporating the reaction mixture (normally volumes range from 15 to 100 l per tube), or an oil layer can be placed on a reaction mixture surfa

... Show More
View Publication Preview PDF
Crossref