Abstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreBetween the duality of sound and image, the completeness of the actor’s personality at the director comes to announce the birth of the appropriate theatrical role for that character as the basic and inherent element of the artwork, within his working system in the pattern of vocal behavior as well as motor/signal behavior as he searches for aesthetic and skill proficiency at the same time.
This is done through the viewer’s relationship with the theatrical event, which the director considers as an area of active creative activity in relation to (the work of the actor) through vocal recitation and the signs it broadcasts in order to fulfill the requirements of the dramatic situation and what it requires of a visual vision drawn in t
The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreBaghdad governorate has many areas of distinctive architectural and architectural character, which are heritage and valuable areas that we must preserve and take care of. But we see many manifestations of it, which have a negative impact on buildings, areas and roads, so that they distort the view and thus lead to visual pollution in general. The research examined the visual pollution from random advertising, which stretched buildings, walls, electricity poles and sidewalks. The study covered different areas of al-Karkh and al-Rassafa (Jadreya Bridge, Nation Square, Jordan Square, alkindy Street)Most of the distortions were the result of non-removable posters, Handwriting, election candidate adve
... Show MoreThe research seeks to identify the contemporary events that face the use of electronic payment methods to localize the salaries of state employees and its impact in enhancing the mental image of customers, and to achieve this purpose from the fact that a questionnaire was designed and distributed to an optional sample of (31) individual customers (employees) dealing With the researched private banks, it has been analyzed and reached a number of conclusions and recommendations, the most prominent of which is the lack of modernity of electronic payment methods by customers, which is reflected in the mental image of customers and the achievement of their satisfaction, in the Emiratization project for salaries needs an advanced leade
... Show MoreThe study aimed to establish the association of miR-153-3p expression with treatment response to IM in CML patients. Sixty CML patients were included and divided into two groups consistent with their response to treatment whether sensitive or resistant to IM. Ten healthy normal participants were enrolled as control group. RNA was extracted from serum to work out miR-153-3p expression utilizing real-time quantitative reverse transcription polymerase chain reaction. The primers were supplied by Macrogen Inc. Twenty seven patients were sensitive to imatinib and 33 were resistant to imatinib. The ratio of male to female was 1.14:1. The bulk (58%) of patients were within the age range of 41-60 years. Weight and gender did not significantly diffe
... Show MoreThis study describes the preparation of new series of tetra-dentate N2O2 dinuclear complexes (Cr3+, Co2+, Cu2+) of the Schiff base derived from condensation of 1-Hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. The structures of the ligands were identified using IR, UV-Vis , mass, elemental analysis and 1H-NMR techniques. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, theromgravimatric analysis (TGA) and metal analysis by atomic absorption. From stoichiometry of metal to ligand and all measurements show a octahedral geometry proposed for all
... Show More