Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The research is based on a thesis not discussed: Test the strategy of the General Organization based on the model Wichler and Bakov A case study at the Iraqi Ministry of Interior
...Show More Authors

The study aimed at identifying the strategic gaps in the actual reality of the management of public organizations investigated to determine the strategy used based on the study model. The study relied on the variable of the general organization strategy in its dimensions (the general organization strategy, the organization's political strategy and the defense strategy of the organization) The sample of the study was (General Directorate of Traffic, Civil Status Directorate and Civil Defense Directorate), formations affiliated to the Ministry of the Interior, for the importance of the activity carried out by these public organizations by providing them In order to translate the answers into a quantitative expression in the analysi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Lossless and Lossy Polynomial Image Compression
...Show More Authors

Crossref (1)
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Equilibrium, Kinetic and Thermodynamic Study of Aniline Adsorption over Prepared ZSM-5 Zeolite
...Show More Authors

Aniline and its derivatives are common contaminants in various wastewaters and represent a serious worry for societies health and a challenge to ecologists due to their dangers effects on to the human health.

ZSM-5 zeolite was prepared from locally available materials (kaolin and rice husk) for adsorption of aniline from synthetic wastewater. Characterization of the prepared zsm-5, kinetics and thermodynamic of the adsorption process were investigated.

The characterization results of the prepared zsm-5 zeolite showed that the surface area was 270.1 m2/g and pore volume 0.21828 cm3/g. The silica to alumina ratio (Si/Al) was 166. 47 and the sodium content was 11 wt. %. The atomic force microscope (AFM)

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Estimation of the demand function of ration card items in the light of IMF reforms
...Show More Authors

The ration card system is a kind of support provided by the state to individuals through the provision of essential goods at subsidized prices during the period of war or crisis. For many years, the ration card was an essential source of food supplies to Iraqis, especially under the economic siege of the nineties, But after the events of 2003 and the passage of Iraq's political and economic changes required radical reforms in the ration card system according to the recipes of the International Monetary Fund. It was evident from the estimation of the demand function that the price did not have the greatest impact on this type of goods because the ration card items are subsidized by the government. There is also a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 11 2022
Journal Name
Journal Of The College Of Basic Education
Breaking the Stereotype Image of Women in Caryl Churchill’s Top Girls
...Show More Authors

تحلل الورقة الحالية تمثيل كاريل تشرشل للصورة النمطية للمرأة في Top Girls (1982). تُظهر المسرحية كيف وصلت النساء في نضالهن لمحاربة اضطهاد الرجال عبر التاريخ ، إلى مستوى من القوة والحرية يستخدمان للسيطرة على جنسهن دون شفقة. مارلين ، الشخصية المركزية في هذه المسرحية ، هي امرأة تبنت الصفات الذكورية إلى أقصى الحدود. لتسلق سلم النجاح إلى قمته ، تضحي مارلين بطفلها وعائلتها وحبها. كما تعرض المسرحية النساء الصامتات والم

... Show More
View Publication
Crossref
Publication Date
Mon Dec 03 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Window Size Changing on Satellite Image Segmentation Using 2D Fast Otsu Method
...Show More Authors

Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
On-Line Navigational Problem of a Mobile Robot Using Genetic Algorithm
...Show More Authors

Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Clinical And Experimental Dentistry
Comparison of the accuracy of intraoral digital impression system and conventional impression techniques for multiple implants in the full-arch edentulous mandible
...Show More Authors

View Publication
Scopus (8)
Crossref (12)
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF