Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Tue Jul 19 2022
Journal Name
Handbook Of Moth-flame Optimization Algorithm
Moth-Flame Optimization Algorithm, Arithmetic Optimization Algorithm, Aquila Optimizer, Gray Wolf Optimizer, and Sine Cosine Algorithm
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu May 03 2001
Journal Name
Master's Thesis
The image of the United States of America in the Iraqi press
...Show More Authors

Preview PDF
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
Pulmonry function test in spinning and weaving workers in Iraq
...Show More Authors

Background :The cotton factories have difference steps, spinning and weaving are van important parts of the factories. Cotton industry workers are exposed to various hazards in the different departments of textile factories. The major health problems associated with cotton dust are respiratory problems. Cotton workers display an excess of lung function abnormalities when compared to a community control population.
Aim of Study: This study assessed the effect of exposure to cotton dust in spinning and weaving workers on the lung function in Iraq, by measuring Forced Vital Capacity (FVC),Forced Expiratory Volume in the first second(FEV1), FEV1 ∕ FVC Ratio, and Forced Expiratory Flow 50%(FEF50%),with varying degree of reduction in lung

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Mon Dec 01 2025
Journal Name
مجلة القادسية للقانون والعلوم السياسية
The Tax Regulation of Digital Currencies: A Financial and Criminal Perspective
...Show More Authors

Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Building marketing culture and reflection on the mental image Search for a pilot sample of managers in the General Company for Vegetable Oil Industry
...Show More Authors

          The subject of marketing culture and mental image is one of the important topics in the field of management. There is no study that combines these two variables. The research is important because of the increasing importance of the subject. The future direction of the company in question will support the company's economic and marketing responsibilities. And reflect the company's mental image, as a culture that contributes to changing the reality of the organization investigated by polling the views of a sample of managers in the General Company for Vegetable Oil Industry, which (30) out of the (65) individual, and There are two hypotheses of research: There is a significant

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play: The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play
...Show More Authors

Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Synthesis and Characterization of Nano-crystalline ZSM-5 Zeolite
...Show More Authors

Abstract

 Nano-crystalline ZSM-5 zeolite was synthesized by hydrothermal method using chelating agent and two gel compositions:Compositionɪ:Al2O3:86SiO2:5.5TPA:12.7Na2O:3.4Trien:3320H2O.Compositionɪɪ:Al2O3:68SiO2:5.4TPA:10Na2O:2.6Trien:2626H2O.Study of hydrothermal reaction factors on characteristics of nano- sized zsm-5 has been carried on ,among them are crystallization temperature, crystallization time and concentration of template ( TPAOH ) solution. Synthesis was accomplished in PTFE lined autoclave ( reactor ) . The product were characterized by X-ray diffraction ( XRD ),Atomic force microsc

... Show More
View Publication Preview PDF