Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
المؤتمر العلمي التخصصي الحادي والعشرون لكلية التربية/ الجامعة المستنصرية 22-23 نيسان 2015 الفيزياء
Computer Simulations of Imaging a Dirac Delta Function by a Ground-Based Optical Telescope
...Show More Authors

Two- dimensional numerical simulations are carried out to study the elements of observing a Dirac point source and a Dirac binary system. The essential features of this simulation are demonstrated in terms of the point spread function and the modulation transfer function. Two mathematical equations have been extracted to present, firstly the relationship between the radius of optical telescope and the distance between the central frequency and cut-off frequency of the optical telescope, secondly the relationship between the radius of the optical telescope and the average frequency components of the modulation transfer function.

Preview PDF
Publication Date
Thu Dec 14 2023
Journal Name
Iete Journal Of Research
Performance Enhancement of VLC-NOMA Employing Beamforming Function based vehicle-to-multivehicle Communication system
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Apr 22 2024
Journal Name
2024 21st International Multi-conference On Systems, Signals & Devices (ssd)
Digital Twin-Based Decision-Making Technique for Diagnostic 2D Environment Line Following Error of Mobile Robot
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
A Survey on Image Caption Generation in Various Languages
...Show More Authors

      The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o

... Show More
View Publication
Crossref (4)
Scopus Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Social Safety Nets and Sustainable Development in Fragile Environments: A Field Social Study of Slums in the City of Baghdad/Al-Karkh: هبة صالح مهدي, عدنان ياسين مصطفى
...Show More Authors

Almost human societies are not void of poverty, as the latter accompanied the emergence of humanity, and it, thus, represents an eternal problem. To advance an individual's reality and raise the level of the poor social classes, social security networks have been established. Such networks operate in society following social systems and laws to provide food, and material support. Besides, such networks help to rehabilitate the individual academically and vocationally. They empower vulnerable groups through the establishment of courses and workshop, provide (conditional) subsidies related to the health and educational aspects in order to achieve the sustainable development goals of (2030), and apply developmental roles of social safety ne

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Tribology International
Discriminating gasoline fuel contamination in engine oil by terahertz time-domain spectroscopy
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Employing digital marketing through communication in promoting the commercial product
...Show More Authors

In recent years, the means of communication have achieved a great generality that made them occupy, in a short time, the first ranks among the most widely used social networks in the world, due to the many services and advantages offered by this network to its users. It has led to a leap in the field of visual communication, especially since it relies mainly on the image Its dimensions make it a means of communication and transfer of ideas and meanings between the peoples of the world, and it also allows the inclusion of digital advertising content using multimedia with a degree of professionalism in other social networks, which allowed the various segments of society the opportunity to invest this network in their businesses of differen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The effectiveness of artificial intelligence in contemporary digital graphic design
...Show More Authors

In our world, technological development has become inherent in all walks of life and is characterized by its speed in performance and uses. This development required the emergence of new technologies that represent a future revolution for a fourth industrial revolution in various fields, which contributed to finding many alternatives and innovative technical solutions that shortened time and space in terms of making Machines are smarter, more accurate, and faster in accomplishing the tasks intended for them, and we find the emergence of what is called artificial intelligence (artificial intelligence), which is the technology of the future, which is one of the most important outputs of the fourth industrial revolution, and artificial inte

... Show More
View Publication Preview PDF
Crossref (3)
Crossref