Adaptive HDR Image Blind Watermarking Approach Based on Redundant Discrete Wavelet Transform DOI Open Access

Roa’a M. Al airaji,

Ibtisam A. Aljazaery,

Haider TH. Salim ALRikabi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2023, Номер 17(10), С. 136 - 154

Опубликована: Май 22, 2023

Remarkable success has been recorded in the usage of digital watermarking which is aimed at protecting intellectual property multimedia content. In this paper, a new tone mapping attack-resistant high dynamic range (HDR) image zero-watermarking algorithm proposed. extraction stable and invariant features are extracted for efficient through application redundant discrete wavelet transform (RDWT) to HDR image. The first step involves transforming HVS color space, RDWT implemented using V-channel so that LL sub-band contains strong structure contents obtained. second dividing into non-overlapping blocks, afterwards subjected process transformation use singular value decomposition (SVD) U matrix can be extracted. Third, an Auto-Regressive (AR) prediction technique was employed generating local relationship model comparison done facilitate production binary feature mask. fourth process, hybrid chaotic (HCM) used generate blended watermark security fortified. Lastly, computation effective zero-watermark achieved implementation exclusive-or operation on Based results, approach presented study demonstrated superior performance terms withstanding TM attacks other associated with processing.

Язык: Английский

Secure Chaos of 5G Wireless Communication System Based on IOT Applications DOI Open Access
Haider TH. Salim ALRikabi, Hussein Tuama Hazim

International Journal of Online and Biomedical Engineering (iJOE), Год журнала: 2022, Номер 18(12), С. 89 - 105

Опубликована: Сен. 14, 2022

This research is aimed at planning the manner in which secure 5G communication can be controlled based on traffic floods. To accomplish excellent administration execution of organization observing and directing calculation inescapable, dynamic steering actual equipment isn't reasonable for practical plans action. Accordingly, to bring down functional capital consumption, we propose a strategy called versatile made do with help (Quality Service MANET (Mobile specially appointed Network). A model will fulfilling needs customers simultaneously gives huge investment funds item cost convenience was presented this paper. perform steering, planned geography virtualized climate. We customized CHAOS network flood board goes about as consistent northward API directing. Network infused dynamically from 1MB up 10MB (connect b/w) progressive way similar 10 occurrences. In conclusion, performed applying control hypothetical method assistance calculations. By looking two situations, noticed prominent distinction throughput controlling application MANETs. data refreshed after clockwork.

Язык: Английский

Процитировано

69

Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques DOI Open Access
Abdul Hadi M. Alaidi,

Roa’a M. Al airaji,

Haider TH. Salim ALRikabi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(10), С. 122 - 139

Опубликована: Май 24, 2022

Dark web is a canopy concept that denotes any kind of illicit activities carried out by anonymous persons or organizations, thereby making it difficult to trace. The content on the dark constantly updated and changed. collection classification such illegal are challenging tasks, as they time-consuming. This problem has in recent times emerged an issue requires quick attention from both industry academia. To this end, efforts have been made article crawler capable collecting pages, cleaning them, saving them document database, proposed. carries automatic gathered pages into five classes. classifiers used classifying include Linear Support Vector Classifier (SVC), Naïve Bayes (NB), Document Frequency (TF-IDF). experimental results revealed accuracy rate 92% 81% were achieved SVC NB, respectively.

Язык: Английский

Процитировано

63

Face Patterns Analysis and Recognition System Based on Quantum Neural Network QNN DOI Open Access
Haider TH. Salim ALRikabi,

Ibtisam A. Aljazaery,

Jaafar Sadiq Qateef

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(08), С. 34 - 48

Опубликована: Апрель 26, 2022

The past few years have witnessed a huge increase in the application of facial recognition, detection, and analysis technology. However, face recognition systems remain most popular among general public. system can detect presence when exposed to one. accuracy fairness that be derived from such necessitate their use, because humans, particularly security personnel tired target wrong person as suspect. artificial intelligence are properly trained capable efficiently identifying classifying faces without errors. In this work, use Matlab language was employed building software is recognizing differentiating different patterns. proposed equipped with camera serves practical aspect captures shots sent theoretical part special program designed recognize by comparing them database stored within program. work involved Quantum Neural Network. training dataset made up features vectors were obtained well-known set images people. Here, Principle Component Analysis (PCA) used for extraction feature then prepared next step. experimental results revealed efficient achieved through well-trained

Язык: Английский

Процитировано

43

Computational Thinking (CT) Among University Students DOI Open Access
Ban Hassan Majeed,

Lina Fouad Jawad,

Haider TH. Salim ALRikabi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(10), С. 244 - 252

Опубликована: Май 24, 2022

Computational Thinking (CT) is very useful in the process of solving everyday problems for undergraduates. In terms content, computational thinking involves problems, studying data patterns, deconstructing using algorithms and procedures, doing simulations, computer modeling, reasoning about abstract things. However, there a lack studies dealing with it its skills that can be developed utilized field information technology used learning teaching. The descriptive research method was used, test tool prepared to measure level consisting (24) items type multiple-choice "CT". study group consists (100) third-year students at University Baghdad Computer Science within scope (2020-2021). results are detailed.

Язык: Английский

Процитировано

43

Malaria parasite detection using deep learning algorithms based on (CNNs) technique DOI

Muqdad Hanoon Dawood Alnussairi,

Abdullahi Abdu İbrahim

Computers & Electrical Engineering, Год журнала: 2022, Номер 103, С. 108316 - 108316

Опубликована: Сен. 1, 2022

Язык: Английский

Процитировано

43

Automated Cheating Detection based on Video Surveillance in the Examination Classes DOI Open Access

Roa’a M. Al airaji,

Ibtisam A. Aljazaery,

Haider TH. Salim ALRikabi

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2022, Номер 16(08), С. 124 - 137

Опубликована: Апрель 26, 2022

A major issue in the field of education is exam malpractice and other forms academic dishonesty, where efforts made towards assessment students are undercut. In order to address this menace, a cheating detection system has been proposed study. The can detect real-time. uses video surveillance monitor activities student during exams, especially abnormal behavior. development involved use three different techniques, with functions. first technique helps determining direction students’ heads when they move from their initial direction, which script. Some form involves peeping at scripts people writing same exam. Whenever observes deviation that exceeds set threshold, it classifies behavior as abnormal. second works movement student’s iris. It detects iris moves copy answers written documents like mobile phones, books, hands, summary papers. third used identifying contact between hands face, well for shared students, such sharing incriminating materials. When any these detected, an automatic alarm alerts authority about thereby minimizing error rate occur result manual monitoring.

Язык: Английский

Процитировано

29

Secured Transfer and Storage Image Data for Cloud Communications DOI Open Access
Mohammad K. Abdul-Hussein, Haider TH. Salim ALRikabi

International Journal of Online and Biomedical Engineering (iJOE), Год журнала: 2023, Номер 19(06), С. 4 - 17

Опубликована: Май 16, 2023

In cloud computing, resources are used to communicate instead of local servers or individual devices. However, sharing among several users is a difficult issue in communication. Cryptography and steganography techniques for storage address data security challenges. This paper presents novel method securely encrypting image transmission link exchange with service. There two phases accomplish the encryption process, first phase encrypts file by XORing it random key that generated new hybrid chaotic map. The second converts encrypted format audio add another layer improve secure transfer. using map has benefit having more than 10256 spaces necessary level security. Based on statistical analysis encryption, quality evaluated criteria, results demonstrate algorithm's ability resist

Язык: Английский

Процитировано

20

Gender Recognition of Human from Face Images Using Multi-Class Support Vector Machine (SVM) Classifiers DOI Open Access
Mohammed Jawad Al Dujaili, Haider TH. Salim ALRikabi, Nisreen Khalil Abed

и другие.

International Journal of Interactive Mobile Technologies (iJIM), Год журнала: 2023, Номер 17(08), С. 113 - 134

Опубликована: Апрель 26, 2023

In the realm of robotics and interactive systems, gender recognition is a crucial problem. Considering several uses it has in security, web search, human-computer interactions, etc., from facial photos garnered lot attention. The need to use enhance techniques felt more strongly today due significant development design systems. Relatively speaking other approaches, progress gained this area thus far not exceptional. Thus, novel method been adopted study improve accuracy comparison earlier research. To create best rate efficiency suggested research, we choose minimal set characteristics. Testing on FERET UTK-Face datasets reveals that our algorithm lower degree inaccuracy. article, input image person's face pre-processed extract right features once recognized. Gender separation achieved using Multi-class Support Vector Machine (SVM) Classifiers after normalized images have extracted Histogram Oriented Gradient (HOG), Gabor Filters, Speeded Up Robust Features (SURF), as well their combination select most appropriate feature them for classification. As reduction feature, Principal Component Analysis (PCA) also employed. Using proposed approach, 98.75% precision accomplished database runtime performance 0.4 Sec. database, 97.43% 0.5

Язык: Английский

Процитировано

17

the Finger Vein Recognition Using Deep Learning Technique DOI Creative Commons

Sahar Wahab khadim,

Hussain K. Ibrahim,

Ameen Majid Shadhar

и другие.

Wasit Journal of Computer and Mathematics Science, Год журнала: 2022, Номер 1(2), С. 1 - 7

Опубликована: Июнь 30, 2022

Finger vein biometrics have gained a lot of attention in recent years because they offer the perfect balance security and economic viability, with advantages such as being least susceptible to identity theft veins are present beneath skin, unaffected by ageing person, etc. All these factors make it necessary create functioning models meet ever-increasing need for security. The use facial recognition AI-based biometrics, particularly law enforcement, has become hot topic its inadvertent demographic bias. Biometric bias, on other hand, far-reaching consequences that extend into daily cases. When an ATM transaction or online banking is compromised false positive negative verification, fraudulent activity made easier. study this research work focused difficulty determining fingertip. On two widely used freely available datasets finger veins, we applied deep convolutional neural network feature extraction. gotten interest recently novel biometric technique. might benefit from applying learning, end-to-end approach shown promising results sectors like face target detection.

Язык: Английский

Процитировано

22

Enhancing Educational Certificate Management and Verification with Blockchain Technology DOI
B. Viswanathan,

B. Lakshmi

Journal of Computer Information Systems, Год журнала: 2025, Номер unknown, С. 1 - 15

Опубликована: Фев. 12, 2025

Язык: Английский

Процитировано

0