Preferred Language
Articles
/
zhcnP48BVTCNdQwCvWUx
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one pixel-wide lines. Finally, the Fusion technique was used to merge the results of the Histogram Equalization process with the Skeletonization process to obtain the new high contrast images. The proposed method was tested in different quality images from National Institute of Standard and Technology (NIST) special database 14. The experimental results are very encouraging and the current enhancement method appeared to be effective by improving different quality images.

Publication Date
Wed Apr 06 2016
Journal Name
Journal Of Water And Health
The effect of chlorine and combined chlorine/UV treatment on coliphages in drinking water disinfection
...Show More Authors

Chlorine disinfection is a globally used method to ensure the safety of drinking water. However, it has not always been successful against viruses and, therefore, it is important to find new methods to disinfect water. Seventeen different coliphages were isolated from the treated municipal wastewater. These coliphages and MS2 were treated with different dosages of chlorine in drinking water, and a combined chlorine/ultraviolet irradiation treatment for the chlorine-resistant coliphages. Chlorine disinfection with 0.3–0.5 mg/L total chlorine (free Cl-dosage 0.12–0.21 mg/L) for 10 min achieved 2.5–5.7 Log10-reductions for 11 sensitive coliphages. The six most resistant coliphages showed no reduction with these chlorine concentra

... Show More
View Publication
Scopus (33)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Hydraulic Analysis and Performance Evaluation of Combined Trunk Sewers: a Case Study of Baghdad City.
...Show More Authors

Sewer system plays an essential task in urban cities by protecting public health and the environment. The operation, maintenance, and rehabilitation of this network have to be sustainable and scientifically. For this purpose, it is crucial to support operators, decision makers and municipalities with performance evaluation procedure that is based on operational factors. In this paper, serviceability and performance indicator (PI) principles are employed to propose methodology comprising two enhanced PI curves that can be used to evaluate the individual sewers depending on operational factors such as flowing velocity and wastewater level in the sewers. To test this methodology; a case study of al-Rusafa in Baghdad city is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 10 2018
Journal Name
Al-kindy College Medical Journal
Modification of Combined Vibrated Power Assisted Liposuction with Periareolar Gland Excision in management of Gynecomastia
...Show More Authors

Background: The recognized procedures that have been used to treat gynecomastia are said to have relatively a long operative time, less patient satisfaction rate, they are merely used, in mild to moderate gynecomastia, leaves a mild bulging over the nipple areola complex, resulting in aesthetically unsatisfactory results. The more the grade of gynecomastia, the more complicated the used surgical techniques. This study evaluates the success rate of these simplest surgical technique in higher grades of gynecomastia.

Objectives: to present the experiences with use of Modification of Combined Vibrated Power Assisted Liposuction with Periareolar Gland Excision in management of in

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Al–bahith Al–a'alami
The Mental Image of the Iraqi Policeman in the Anbar Province
...Show More Authors

The study of images in the cognitive field receives considerable attention by researchers, whether in the field of media and public relations or in other humanities. Due to the great importance in shaping trends of public opinion, especially trends that individuals and the behaviors of people, institutions or ideas are determined by forming images that they hold in their minds towards these persons or institutions. Modern enterprises have realized, whether they are governmental ministries and official departments or non-governmental organizations as civil society organizations, the importance of studying the dominant image in the minds of the masses and make decisions and draw plans to configure this image as these institutions wishes.&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon May 27 2019
Journal Name
Al-academy
Advertising Image Semiotics in the Printed Poster: عبد الحسين عبد الواحد عبد الرزاق
...Show More Authors

The present research aims at revealing the advertising image semiotics in the American printed poster by following the image's significance and its transformations through the poster design trends and indicating its nature whether it is an explicit or implicit image. The limits of the research were the American printed poster during 2016-2018 period. The theoretical side was determined by two sections, the first: (the advertising image semiotics) and the second (design trends in the printed poster). The research procedures were represented by the research method adopted in the analysis of the sample models identified in four models taken from the research community which contains (24) models. The selection was made according to the trend

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

Crossref (1)
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref