Preferred Language
Articles
/
FhZFu4sBVTCNdQwCN9mx
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors

Publication Date
Fri Mar 25 2022
Journal Name
Journal Of The College Of Basic Education
Semantic image coding in contemporary Theatrical performance
...Show More Authors

تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح

... Show More
View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Making political image in the election campaigns
...Show More Authors

The study discusses the marketing profile of electoral candidates and politicians especially the image that takes root in the minds of voters has become more important than the ideologies in the technological era or their party affiliations and voters are no longer paying attention to the concepts of a liberal, conservative, right-wing or secular, etc. while their interests have increased towards candidates. The consultants and image experts are able to make a dramatic shift in their electoral roles. They, as specialists in the electoral arena, dominate the roles of political parties.
The importance of the study comes from the fact that the image exceeds its normal framework in our contemporary world to become political and cultural

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Mon Jul 01 2019
Journal Name
International Journal Of Computer Science And Mobile Computing
Color Image Compression of Inter-Prediction Base
...Show More Authors

Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

The aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Feb 18 2026
Journal Name
Journal Of Engineering
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

View Publication
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors