Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Molecular Liquids
Theoretical modeling study on preparation of nanosized drugs using supercritical-based processing: Determination of solubility of Chlorothiazide in supercritical carbon dioxide
...Show More Authors

View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Journal Of Biological Macromolecules
A novel designed nanofibrous mat based on hydroxypropyl methyl cellulose incorporating mango peel extract for potential use in wound care system
...Show More Authors

View Publication
Scopus (13)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The general budget and censorship on it in Iraqi legislation
...Show More Authors

The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study
...Show More Authors

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 10 2025
Journal Name
Proceedings On Engineering Sciences
WAREHOUSE IN INDUSTRY 4.0 BASED DRONE, COMPUTER VISION, AND ARTIFICIAL INTELLIGENCE TECHNOLOGIES: A LITERATURE REVIEW
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The efficiency of Using Attribute and Performance- Based Activity Methods to Raise the Level of Control Deviation A field study in Jaber Bin Hayyan Factory
...Show More Authors

Cost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Taxonomy of Memory Usage in Swarm Intelligence-Based Metaheuristics
...Show More Authors

Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char

... Show More
View Publication Preview PDF
Crossref (3)
Clarivate Crossref
Publication Date
Tue Jun 11 2019
Journal Name
Al-kindy College Medical Journal
Evaluation of Application of Nutritional Status Assessment for Children Under 5 years by Using IMCI Program in a Sample of Primary Health Care Centers in Baghdad City
...Show More Authors

Background: World Health Organization (WHO) and United Nation International Children Fund (UNICEF) developed a strategy known as Integrated Management of Childhood Illness (IMCI); which aims to reduce less than five years children morbidity and mortality in developing countries.

Objective: To assess the completion of the IMCI format status in primary health care centers, Baghdad.

Methods:  A cross sectional study with analytic element was conducted during the period from 15th  of January till 15th  May 2016 in selected Primary health centers in Baghdad, Iraq. The sample consists of form of child files less than 2 months and form from 2

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
The Effect of Age and occupation on the Type and the Number of workers injuries in construction sector in Iraq
...Show More Authors

World statistics proved that the most of work dangerous accidents, which causes death, are occurred in the construction works. These accidents related to many causes such as loss of workers experience and ignoring rules of safety requirements, especially young workers. Due to the risk of accidents that may occur in the site of work, the idea of this study crystallized to show the relationship between the age of worker and number of injuries and accidents, to identify the causes of these injuries, and to put the appropriate solutions to avoid or reduce the risk of work injuries. Also, the research shows the main principles of safety requirements to forming a clear picture about the subject of the study. A questioner form was prepared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
A Solution of Second Kind Volterra Integral Equations Using Third Order Non-Polynomial Spline Function
...Show More Authors

In this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.

View Publication Preview PDF
Crossref (2)
Crossref