In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show MoreThe research shows that the visual image plays an important role when Farzdaq in the issue of aesthetic perception, it enables him to feel a sense of artistic and mental perception to raise astonishment and admiration through his ability to link the optics through the suggestive image to carry us to a new vision imagined full of visual images.
Image Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH
... Show MoreApplying load to a structural member may result in a bottle-shaped compression field especially when the width of the loading is less than the width of bearing concrete members. At the Building and Construction Department – the University of Technology-Iraq, series tests on fibre reinforced concrete specimens were carried out, subjected to compression forces at the top and bottom of the specimens to produce compression field. The effects of steel fibre content, concrete compressive strength, transverse tension reinforcement, the height of test specimen, and the ratio of the width of loading plate to specimen width were studied by testing a total of tenth normal strength concrete blocks with steel fibre and one normal s
... Show MoreThe thermal performance of indirect expansion solar assisted heat pump, IX-SAHP, was investigated experimentally under Iraqi climate. An Indirect-Solar Assisted Heat Pump system was designed, built, instrumented and tested. Experimental tests were conducted by varying the controlling parameters to investigate their effects on the thermal performance of the IX-SAHP such as cooling water flow rate, heating water flow rate, ambient temperature and solar radiation intensity. The investigation covered values of cooling water flow rate of (2, 3, 4, 5 l/min) and heating water flow rate of (2, 3, 4, 5 l/min) under meteorological condition of Baghdad from November 2014 to January 2015.
The results indicated that the performance of the IX-
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More