In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was shown upon attempting different attacks, such as histogram equalization,
double winner filtering and scaling.
Elzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.
There is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreIR, MIR, UV – Visible spectra have been studied for Cobalt chloride molecule (CoCl2. 6H2O) compound, In wide range spectra (40000 – 410) cm-1 specially MIR range. Assignment were achieved for the fundamental vibrational bands of (CoCl2 . 6H2O ) to symmetry stretching ?1 (?^+) Anti – symmetry stretching ?3(?^+), these bands are non-degenerate , and the bending band is ?2(?) is doubly degenerate thought they have activity in IR and Raman , which explain the weakness in symmetry of this molecule, the fundamental bands for the molecule are centered at the following wave numbers (615, 685, 795, 1115, 1340, 1375, 1616.35, 2091, 2386, 2410, 3364) cm-1 which are corresponding to wave lengths (16260, 14598, 12578, 8968, 7462, 7272, 6186,
... Show MoreVisible Light Communication (VLC) has emerged as a powerful technique for wireless communication systems. Providing high data rate and increasing capacity are the major problems in VLC. Recent evidence suggests that Multiple Input Multiple Output (MIMO) technique can offers improved data rates and increased link range. This paper describes the design and implementation of visible light communication system in indoor environment exploring the benefits of MIMO. The specific objective of this research was to implement a 4× 4 Multiple Input (LEDs) Multiple Output (photodetectors)-VLC communication system, where a 16 white power LEDs in four arrays are setting up at transmitter and four RX modules are setting up at receiver side without the nee
... Show MoreThe researchers have a special interest in studying Markov chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one of the ministries. Results are analyzed by applying Maximum likelihood estimation and Ordinary least squares methods resulting
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More