Preferred Language
Articles
/
yhY5mYcBVTCNdQwCGFen
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.

Scopus Crossref
Preview PDF
Quick Preview PDF
Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Satellite Image Mosaics Using Digital Cosine Transform (DCT) Descriptor
...Show More Authors

In this research work, a modified DCT descriptor are presented to mosaics the satellite images based on Abdul Kareem [1] similarity criterion are presented, new method which is proposed to speed up the mosaics process is presented. The results of applying the modified DCT descriptor are compared with the mosaics method using RMSE similarity criterion which prove that the modified DCT descriptor to be fast and accurate mosaics method.

View Publication Preview PDF
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Deep Learning-Based Speech Enhancement Algorithm Using Charlier Transform
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Drugs In Dermatology: Jdd
Melanocytes transplantation in patients with vitiligo using needling micrografting technique.
...Show More Authors

KE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Drugs in Dermatology: JDD, 2013 - Cited by 22

View Publication
Publication Date
Thu Jul 10 2025
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
2012 Ieee-embs Conference On Biomedical Engineering And Sciences
Compatibility of mother wavelet functions with the electroencephalographic signal
...Show More Authors

View Publication
Scopus (25)
Crossref (20)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform
...Show More Authors

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 28 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Using Crushed Glass with Sand as a Single and Dual Filter Media for Removal of Turbidity from Drinking Water
...Show More Authors

View Publication
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Differential Transform Methods for Solving Differential Equations with Multiple Delay
...Show More Authors

In this paper, we present an approximate analytical and numerical solutions for the differential equations with multiple delay using the extend differential transform method (DTM). This method is used to solve many linear and non linear problems.

 

View Publication Preview PDF