Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
International Journal Of Research In Social Sciences And Humanities
CHARACTERISTICS OF THE POWER CHAIN FUNCTION CURVE AND ITS RELATION TO THE ACCURACY OF THE HIGH-JUMP JUMP IN THE HANDBALL
...Show More Authors

The skill high-jump scoring is based on mechanical and physical abilities. The most important of all is the strength used by the player from the moment of preparation to the moment of scoring, which led the researchers to study the characteristics of the series of power chain functions of this skill according to (Biosyn System) The players of the national team's back line have a handball to find out the relationship between the properties of the power chain curve and the accuracy of the high jump to the upper and lower target angles. The aim of the research was to identify the values of the Force Series variables for the skill of the high-jump curve of the handball as well as the relationship between the properties of the power chain functi

... Show More
Publication Date
Mon Apr 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة العدد الخاص بمؤتمر الكلية
A propose method for hiding image into image
...Show More Authors

Publication Date
Thu Dec 20 2007
Journal Name
Journal Of Planner And Development
Globalization and the identity of the mental image structure of urban spaces
...Show More Authors

This research discusses the subject of identity in the urban environment as it attempts to answer a number of questions that come with the concept of identity. The first of these questions: What is identity? Can a definition or conceptual framework be developed for identity? What about individual, collective, cultural, ethnic, political and regional identity? Is there a definition of identity in the urban environment in particular? If there is a definition of identity, what about social mobility responsible for social change? How can we see identity through this kinetics? Can we assume that identity in the urban environment has a variable structure or is of variable shape with a more stable structure? Can we determine the spatial-tempora

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Inorganic Chemistry Communications
Study to molecular insight into the role of aluminum nitride nanotubes on to deliver of 5-Fluorouracil (5FU) drug in smart drug delivery
...Show More Authors

The adsorption process of 5-Fluorouracil (5FU) drugs on Aluminum nitride nanotubes surface (AlNNTs) have been evaluated through density functional theory (DFT). The DFT results show that the interaction of AlNNTs with the F atoms of 5FU drugs is strong due to the fact that the amount of adsorption energy was about − 29.65 kcal.mol−1. Conversely, the interaction of the 5FU through O atoms with the AlNNTs was weaker due to the lower value of adsorption energy. Also, based on the values of Gibbs free energy, the 5FU adsorption on the surfaces of AlNNTs was spontaneous. In addition, based on natural bond orbital (NBO) analysis, the direction of charge transfer was from fluorine’s σ orbitals of the drug to nitrogen’s and aluminum’s n*

... Show More
View Publication
Scopus (8)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
5'-nucleoridase activity in sera from iraq children with leukemia
...Show More Authors

Enzyme activity were studied in the sera of children with leukemia than healthy children, where 31 cases were studied, including 21 cases of patients with acute lymphatic leukemia

View Publication Preview PDF
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
5 year-analysis of reported dog bites in Baghdad city
...Show More Authors

Background: Animal bites in humans are an important public health problem. Most of these bites are dog bites. Dog bites in humans are a complex problem embracing public health and animal welfare, both in developed and developing nations. .
Al-kindy Col Med J Vol.8 No.2 2012 P: 151
Objectives: in order to estimate the magnitude of the problem and to understand the epidemiological characteristics of dog bite victims registered in Baghdad city regarding their age, sex, number of registered dog bite victims per month and year along the studied period ( 2006-2010) and also to sniff out any seasonal variation in dog bite attacks .
Methods: A across-sectional study was carried out during January (2011), in the Anti-Rabies clinic of (Pa

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
5 year-analysis of reported dog bites in Baghdad city
...Show More Authors

Background: Animal bites in humans are an important public health problem. Most of these bites are dog bites. Dog bites in humans are a complex problem embracing public health and animal welfare, both in developed and developing nations. .
Al-kindy Col Med J Vol.8 No.2 2012 P: 149
Objectives: in order to estimate the magnitude of the problem and to understand the epidemiological characteristics of dog bite victims registered in Baghdad city regarding their age, sex, number of registered dog bite victims per month and year along the studied period ( 2006-2010) and also to sniff out any seasonal variation in dog bite attacks .
Methods: A across-sectional study was carried out during January (2011), in the Anti-Rabies clinic of (Pa

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 29 2024
Journal Name
Surgical Neurology International
Enhancing neuro-ophthalmic surgical education: The role of neuroanatomy and 3D digital technologies – An overview
...Show More Authors
Background:

Neuro-ophthalmology, bridging neurology and ophthalmology, highlights the nervous system’s crucial role in vision, encompassing afferent and efferent pathways. The evolution of this field has emphasized the importance of neuroanatomy for precise surgical interventions, presenting educational challenges in blending complex anatomical knowledge with surgical skills. This review examines the interplay between neuroanatomy and surgical practices in neuro-ophthalmology, aiming to identify educational gaps and suggest improvements.

Methods:

A literature search across databases such as PubMed, Scopus, and W

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (21)
Crossref