Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 30 2025
Journal Name
Iraqi Journal Of Science
Improving the Reliability of Evolutionary Algorithm for Complex Detection in Noisy Protein-Protein Interaction Networks
...Show More Authors

Evolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Interpretation of Mud Losses in Carbonates Based on Cuttings Description, Well-Logging, Seismic and Coherency Data
...Show More Authors

    Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm.

   The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potentia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Tue Mar 19 2024
Journal Name
Baghdad Science Journal
Comparison of physical characteristics of mass and luminosity function of disk systems in barred and unbarred spiral galaxies
...Show More Authors

إحدى أهم الطرق لتقصي توزيع المجرات عبر الزمن الكوني هي دالة اللمعان LF بدلالة كتلة القرص الباريوني ψS(Mb)، القدر . لقد درسنا تقديرًا لكثافة كتلة الباريون في عينة من المجرات الحلزونية القضيبية وغير القضيبية من الادبيات السابقة، والتي تتضمن فعليًا، لكل صنف من الاجرام السماوية ذات المحتوى الباريون المرئي، جزءًا لا يتجزأ من ناتج دالة الضيائية (LF) ونسبة الكتلة إلى الضوء. استخدمت تقنية الانحدار المتعدد لحزمة الب

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue May 20 2008
Journal Name
Journal Of Planner And Development
Estimating Water Quality from Satellite Image and Reflectance Data
...Show More Authors

The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables

View Publication Preview PDF
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ELEMENTS OF MARKETING MIX AND THEIR ROLE IN CONSUMER PERCEPTION OF BRAND IMAGE: A SURVEY OF SAMPLE OPINIONS FROM CONSUMERS OF ENIEM BRAND IN THE ALGERIAN MARKET.: ELEMENTS OF MARKETING MIX AND THEIR ROLE IN CONSUMER PERCEPTION OF BRAND IMAGE: A SURVEY OF SAMPLE OPINIONS FROM CONSUMERS OF ENIEM BRAND IN THE ALGERIAN MARKET.
...Show More Authors

The current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
On Generalized Continuous Fuzzy Proper Function from a Fuzzy Topological Space to another Fuzzy Topological Space
...Show More Authors

The purpose of this paper is to introduce and study the concepts of fuzzy generalized open sets, fuzzy generalized closed sets, generalized continuous fuzzy proper functions and prove results about these concepts.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref