Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 28 2022
Journal Name
The Iraqi Journal Of Veterinary Medicine
Effect of Phosphatidylcholine on Dyslipidemia and Atherogenic Index in High Fructose Exposed Rats
...Show More Authors

The purpose of this research was to investigate the beneficial effects of phosphatidylcholine in reducing changes in both lipid and protein profiles in addition to atherogenic index in adult rats with fructose-induced metabolic syndrome. Thirty-six mature Wistar Albino female rats (Rattus norvegicus) (aged 12-15 weeks and weighing 200±10 g) were divided randomly into four groups (G1, G2, G3, and G4); then variable treatments were orally administered for 62 days as follows: G1 (Control group), received distilled water; G2, treated with phosphatidylcholine (PC) orally (1 g/kg BW); G3 (Fr), orally dosed with 40% fructose and 25% fructose mixed with drinking water; G4 (Fr+PC), were also intubated with 40% fr

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Sep 15 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Impact of oral hygiene instructions on cytokines in smokers and vapers with gingivitis
...Show More Authors

Background: Cigarette smoking (CS) is a periodontal disease risk factor, affecting clinical parameters such as bleeding on probing (BOP), plaque index (PI), gingival index (GI) and proinflammatory cytokines level. This study examines the impact electronic cigarette use on proinflammatory cytokines and periodontal parameters. Methods: In this non-randomized study, ninety participants diagnosed with gingivitis were assigned into three groups. examined the effect of oral hygiene instructions on periodontal parameters and inflammatory biomarkers. Thirty CS (n=30) vaping electronic-cigarettes (e-cig) (n=29), and non-smoker (NS) (n=31) was included. Clinical parameters including PI, BOP, and GI were recorded at baseline and after 3 weeks

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (273)
Crossref (207)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
The structure of design and technology in the contemporary design in the interior spaces
...Show More Authors

The design of the interior spaces process the product of intellectual civilization expresses the prevailing thought, discoverers of principles and beliefs through the sheen reflects the present, and generating languages ​​graphical variety caused a different revolution in design mounting structure, and because of the complex nature of the interior spaces were and we have to be a reflection of cultural reality of being a form of cultural expression and true embodiment of scientific developments prevailing for each stage where she was born, the changes occurring in human thought and then extremism and the discrepancy tastes among individuals all communities factors have caused a change in the design structure involving modernization an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
A careful study of the effect of the infectious diseases and refuge on the dynamical behavior of prey-scavenger modeling
...Show More Authors

In this paper, the dynamics of scavenger species predation of both susceptible and infected prey at different rates with prey refuge is mathematically proposed and studied. It is supposed that the disease was spread by direct contact between susceptible prey with infected prey described by Holling type-II infection function. The existence, uniqueness, and boundedness of the solution are investigated. The stability constraints of all equilibrium points are determined. In addition to establishing some sufficient conditions for global stability of them by using suitable Lyapunov functions. Finally, these theoretical results are shown and verified with numerical simulations.

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 10 2024
Journal Name
مجلة الثقافة الرياضية
The Effect of Resistance Training Using Elastic Bands on the Developmentof Specific Endurance and Performance of the Oji-mata Skill
...Show More Authors

t: - Sports training in itself is a means, not an end. It is the core process that involves using exercises to provide an opportunity for athletes to perform their duties with the highest level of efficiency by developing and enhancing their capabilities and potential, using them to gain the greatest benefit for themselves and, consequently, for their team. This requires the selection of various methods and different means of training, focusing on specific physical and skill-related aspects. Therefore, training plans should take into account individual differences between players. Many researchers and experts in the field of sports in general, and combat sports in particular, emphasize the importance of having a holistic approach in the tra

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Aip Conference Proceedings
Study the effect of addition of Ar to N2 gas on the EEDF and the correspondent coefficients of electron transport
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Apr 19 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
The Impact Of Innovative Matrix Strategy And The Problem Tree Strategy On The Mathematical Proficiency Of Intermediate Grade Female Students
...Show More Authors

The research aims to know the impact of the innovative matrix strategy and the problem tree strategy in teaching mathematics to intermediate grade female students on mathematical proficiency. To achieve the research objectives, an experimental approach and a quasi-experimental design were used for two equivalent experimental groups. The first is studied according to the innovative matrix strategy, the second group is studied according to the problem tree strategy. The research sample consisted of (32) female students of the first intermediate grade, who were intentionally chosen after ensuring their equivalence, taking into several factors, most notably (chronological age, previous achievement, and intelligence test). The research tools con

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
The Spectrum and the Numerical Range of the Product of Finite Numbers of Automorphic Composition Operators on Hardy Space 2
...Show More Authors

Throughout this paper we study the properties of the composition operator
C
p1  o
p2  o…o
pn  induced by the composition of finite numbers of special
automorphisms of U,
pi  (z)  i
i
p z
1 p z


Such that pi  U, i  1, 2, …, n, and discuss the relation between the product of
finite numbers of automorphic composition operators on Hardy space H2 and some
classes of operators.

View Publication Preview PDF