research centers


Search results: Found 4

Listing 1 - 4 of 4
Sort by

Article
Image Scramble based on Discrete Cosine Transform and Henon Map

Author: Mohammed Jasim Ridha محمد جاسم رضا
Journal: Iraqi Journal of Information Technology المجلة العراقية لتكنولوجيا المعلومات ISSN: 19948638/26640600 Year: 2019 Volume: 9 Issue: 4 Pages: 96-107
Publisher: iraqi association of information الجمعية العراقية لتكنولوجيا المعلومات

Loading...
Loading...
Abstract

In recent years, there are exponential increment on using images in communication and social media that always need to develop a new method for scramble these images. These scramble methods keep image secure from malicious attack. A proposed method for scramble image is presented by multi-levels and in each level, there are more than one option is performed to keep image in secure manner. Scrambling is functional by using key that is generated from chaotic function called Henon map which provide significant randomize properties and in dynamic order. Scrambling is applied in spatial domain and in frequency domain, the first level before discrete cosine transform DCT, the second level on DCT coefficient and the third level when return back to spatial domain. The implementation of proposed method present low PSNR to scrambled image with respect to the original image and the time consuming also is precise. The development of proposed method may applied on partitioned image or may combined with other method to increase the security level.

Keywords

Image Scramble --- DCT --- IDCT --- Henon Map --- Chaotic Map


Article
MEDICAL IMAGES COMPRESSION BASED ON SPIHT AND BAT INSPIRED ALGORITHMS

Author: Sarah Jasim Sarah Jasim
Journal: Iraqi Journal for Computers and Informatics المجلة العراقية للحاسبات والمعلوماتية ISSN: 2313190X 25204912 Year: 2019 Volume: 45 Issue: 1 Pages: 1-5
Publisher: University Of Information Technology And Communications جامعة تكنولوجيا المعلومات والاتصالات

Loading...
Loading...
Abstract

There is a significant necessity to compress the medical images for the purposes of communication and storage.Most currently available compression techniques produce an extremely high compression ratio with a high-quality loss. Inmedical applications, the diagnostically significant regions (interest region) should have a high image quality. Therefore, it ispreferable to compress the interest regions by utilizing the Lossless compression techniques, whilst the diagnostically lessersignificant regions (non-interest region) can be compressed by utilizing the Lossy compression techniques. In this paper, a hybridtechnique of Set Partition in Hierarchical Tree (SPIHT) and Bat inspired algorithms have been utilized for Lossless compressionthe interest region, and the non-interest region is loosely compressed with the Discrete Cosine Transform (DCT) technique.The experimental results present that the proposed hybrid technique enhances the compression performance and ratio. Also,the utilization of DCT increases compression performance with low computational complexity.


Article
A comparative Study for Designing an Efficient Intelligence System for the Process of Discrimination
دراسة مقارنة لتصميم نظام ذكائي كفوء لعملية التمييز

Authors: Iman S. Mohammed --- Shatha A. Mohammed
Journal: JOURNAL OF EDUCATION AND SCIENCE مجلة التربية والعلم ISSN: 1812125X Year: 2019 Volume: 28 Issue: 4 Pages: 206-223
Publisher: Mosul University جامعة الموصل

Loading...
Loading...
Abstract

Face recognition is one of the most important biometrics techniques used to identify people. The research aims to build an efficient system by devising a new method of discrimination that includes advanced image processing techniques and intelligent techniques. This work has been implemented in several stages, the first of which is the arrangement of the database, Followed by pre-processing based on the integration of Gaborand DCT conversion. And then adopt two methods in extracting statistical features, the first dependent first-class statistics, the second dependent second-class statistics of the GLCM matrix and then draw the important features of them. In the phase of discrimination, two types of artificial neural networks were used after their construction in the 2016 MATLAB environment, BPNN and Elman. Finally, the efficiency of the methods used and the identification of the best were compared.


Article
Using Rubik’s Cube in Fragile Audio Watermark Encryption
استخدام مكعب روبيك في تشفير العلامة المائية الصوتية الهشة

Authors: Rana M. Hassan رنا محمد حسن --- Matheel E. Abdulmuim مثيل عمادالدين عبدالمنعم
Journal: Diyala Journal For Pure Science مجلة ديالى للعلوم الصرفة ISSN: 83732222 25189255 Year: 2019 Volume: 15 Issue: 03 Pages: 103-124
Publisher: Diyala University جامعة ديالى

Loading...
Loading...
Abstract

Nowadays, due to the accelerated advancement of internet and multimedia technology, transmission and spreading of multimedia data have become very easy work. This has become a thoughtful threat to the owners of multimedia content. Therefore, a major attention has been given to multimedia data copyright security. In this paper, the proposal of an audio watermarking algorithm that is secure, robust, and blind for copyright security was presented. Decomposing the audio signal is made first with Discrete Wavelet Transform (DWT), thereafter selecting the coefficient of low-frequency which then made into frames. Next, on each frame, Discrete Cosine Transform (DCT) is directed. The essential features are concluded from the entered audio signal, then these features are encoded to produce Quick Response (QR) code to produce the watermark image, and by a novel technique which utilizes Rubik's cube, this watermark image is next encrypted. Later the watermark bits are implemented into DCT coefficient by Quantization Index Modulation )QIM( determined by frame number. The results of experiments imply that this algorithm is strong against numerous signal strikes, unnoticeable and has an elevated average Signal to Noise Ratio (SNR) value reaches 61 dB.

في الوقت الحاضر، بسبب التطور المتسارع في تكنولوجيا الإنترنت والوسائط المتعددة، أصبح نقل ونشر بيانات الوسائط المتعددة عملاً سهلاً للغاية. الذي أصبح تهديداً مدروساً لأصحاب محتويات الوسائط المتعددة. لذلك، تم إيلاء اهتمام كبير لأمن حقوق النشر لبيانات الوسائط المتعددة. في هذا البحث، تم تقديم اقتراح الخوارزمية الصوتية بالعلامة المائية التي هي آمنة وقوية وعمياء لأمن حقوق التأليف والنشر. يتم إجراء تحليل الإشارة الصوتية أولاً بتحويل المويجات المنفصلة (DWT)، بعد ذلك اختيار معامل التردد المنخفض الذي بعد ذلك يحول الى اطر في كل إطار يتم توجيه تحويل (DCT). يتم الحصول على الميزات الأساسية من كل إشارة صوتية، وبعد ذلك سيتم ترميزها لإنتاج رمز الاستجابة السريعة كصورة مائية مكيفة، وبتقنية مقترحة تستخدم مكعب روبيك هذه الصورة بالعلامة المائية المشفرة. في وقت لاحق يتم زرع بتات العلامة المائية في معامل DCT عن طريق تعديل مؤشر التكمية QIM يتم تحديده بواسطة رقم الإطار. تشير نتائج التجارب إلى أن هذه الخوارزمية قوية ضد العديد من المؤشرات الرقمية، والتي كانت غير ملحوظة ولها قيمة مرتفعة للإشارة إلى نسبة الضوضاء (SNR) يصل إلى dB 61.

Listing 1 - 4 of 4
Sort by
Narrow your search

Resource type

article (4)


Language

English (3)

Arabic (1)


Year
From To Submit

2019 (4)