Kawther Thabt Saleh
Mustansiriyah University

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Human ear print recognition based on fusion of difference theoretic texture and gradient direction pattern features Kawther Thabt Saleh; Raniah Ali Mustafa; Haitham Salman Chyad
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 2: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i2.pp1017-1029

Abstract

Human ear recognition can be defined as a branch of biometrics that uses images of the ears to identify people. This paper provides a new ear print recognition approach depending on the combination of gradient direction pattern (GDP2) and difference theoretic texture features (DTTF) features. The region of interest (ROI), the gray scale of the ear print was cut off, noise removal by the median filter, histogram equalization, and local normalization (LN) are the first steps in this approach. After the image has been processed, it is used as input for the fusion of GDP2 and DTTF for extracting the features of ear print images. Lastly, the Gaussian distribution (GD) was utilized to compute the distance among fusion feature vectors (FV) for ear print images for recognizing ear print images for people using a set of images that had been trained and tested. The unconstrained ear recognition challenge (UERC) database, which comprises 330 subjects for ear print images, provides the approach that was suggested by employing ear print databases. Furthermore, experimental results on images from a benchmark dataset reveal that statistical-rely super-resolution methods outperform other algorithms in ear recognition accuracy, which was around 93.70% in this case.
Chaotic map technique for enhancement security for android mobile system based on image encryption Kawther Thabt Saleh; Nisreen Abd Alhadi Jabr; Iman Hussein Al-Qinani
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1698-1703

Abstract

Network security continues to be the priority of many organizations. To ensure the protection of their data, they pay great attention to Encryption systems. Moreover, because of the enormous developments in networks of connection particularly the internet which has used by several people to share a variety of data kinds. The security of data has been a significant issue. As a result, there is a significant focus in using methods of decryption and encryption. Numerous encryption techniques have become advanced to preserve data protection, chaotic encryption systems are one of these methods widely used in recent years, where several techniques were proposed to use a chaotic map for encrypt images for the reason that of their characteristics e.g., random action unpredictability and initial conditions sensitivity. In this paper, proof authentication of sent information is used chaotic encryption algorithm to provide cipher text and hidden in image then send to another user. This approach is applied in cellular operating system environment (android). Thus, the sending and receiving of text will be safe and secure. The proposed approach is tested on different types of mobile. The proposed system gives good results.