About
78
Publications
39,536
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,918
Citations
Introduction
Additional affiliations
October 2010 - September 2011
Applied Sciences University
Position
- Professor (Associate)
October 2006 - September 2007
Publications
Publications (78)
Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confid...
The tremendous advancement of digital technology has increased the ease with which digital multimedia
signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers
and owners are faced with problems of protection against copyright violation and other forms of abuse
to their digital property. Digital wate...
Medical images exchanged over public networks require a methodology to provide confidentiality for the image, authenticity of the image ownership and source of origin, and image integrity verification. To provide these three security requirements, we propose in this paper a region-based algorithm based on multiple watermarking in the frequency and...
In this paper, a new SVD-based digital watermarking scheme for ownership protection is proposed. The proposed algorithm solves the problem of false-positive detection. In addition, it enjoys all the advantages of SVD-based schemes. Instead of using a randomly generated Gaussian sequence, a meaningful text message is used. Thus, clarity of the extra...
The proliferation of digitized media due to the rapid growth of networked multimedia systems, has created an urgent need for copyright enforcement technologies that can protect copyrightownership of multimedia objects. Digital image watermarking is one such technology that has been developed to protect digital images from illegal manipulations. In...
Fog computing has been introduced in recent years to extend cloud services to the network edge in order to minimize network delay and network congestion and overcome cloud computing limitations. However, several challenges are yet to be addressed in order to achieve the full benefits of the fog-IoT paradigm for low latency applications. The foremos...
The 802.11ah standard is a new energy-efficient, wireless networking protocol which allows thousands of indoor and outdoor devices to be connected to the same access point. The Centralized Authentication Control (CAC) method, described in the standard, enables up to 8000 stations to be authenticated and associated with the same access point. A base...
A well-known representation method for 3D images is the Depth-Image-Based-Rendering method (DIBR). It operates on a monoscopic center view and an associated per-pixel depth map image to generate two virtual views; a left-eye view and a right-eye view. During transmission, the three views can be illegally copied and manipulated, and thus providing c...
Lightweight cryptography has been proposed recently as an attractive solution to provide security for the ever-growing number of IoT resource-constrained devices. Many of the proposed lightweight cryptographic ciphers have been implemented in software. However, for practical embedded IoT applications, hardware implementations are preferred because...
The resource-constrained nature of Internet of Things (IoT) devices and their diversity and abundancy represent a major challenge for the development of efficient security solutions that fit IoT systems and ensure end-to-end security. This paper presents an efficient IoT authentication scheme that provides mutual authentication between three differ...
Medical, military, and cloud computing applications require high degrees of security and privacy, and thus they are potential candidates to benefit from hiding data in encrypted images. This paper introduces a new algorithm that combines cryptography and data hiding techniques to hide data into encrypted grayscale images in a reversible manner. Bas...
Medical images exchanged over vulnerable networks are sensitive to modifications or tampering which could lead to misdiagnosis, risking the lives of the patients. Therefore, to provide safe and secure transmission of medical images, key security requirements such as authenticity, integrity, and confidentiality must be addressed. In this paper, a no...
Data hiding techniques are used to embed information into digital objects for the purpose of copyright protection, covert communication, media notation, among other applications. Compared with traditional data hiding techniques, reversible data hiding (RDH) can restore the original digital object after extracting the hidden data. This makes RDH ver...
This chapter presents a novel, separable, and blind joint encryption/watermarking algorithm that will provide security for transmitted medical images. The frequency domain algorithm combines cryptography as a preprotection mechanism and digital watermarking as a postprotection mechanism to provide the required security requirements. The algorithm i...
Data hiding in multimedia objects such as text, images, audio and video clips is a technique that has been widely used to achieve security for applications requiring copyright protection, covert communication, and tampering detection. Data hiding can be irreversible or reversible, where the latter is used to ensure exact recovery of the media objec...
In this paper an efficient crypto-watermarking algorithm is proposed to secure medical images transmitted in tele-medicine applications. The proposed algorithm uses standard encryption methods and reversible watermarking techniques to provide security to the transmitted medical images as well as to control access privileges at the receiver side. Th...
With the continuous advancements in 3D display technology, the need arises for new methods to create and distribute 3D stereoscopic content. Depth-Image-Based Rendering (DIBR) has been recently recognized as an effective method to synthesize 3D content due to its low bandwidth requirement and depth adjustment capability. However, as important it is...
Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a regio...
Telemedicine has increased the number of ways in which healthcare can be delivered across places and countries instead of requiring the provider and the recipient to be present in the same place. One application of telemedicine is the exchange of medical images between remotely located healthcare entities. However, a major obstacle telemedicine fac...
Depth-Image-Based Rendering (DIBR) is an effective 3D
image generation method. It has been widely used by virtue
of its low bandwidth requirements and depth adjustment
capability. However, the development of an effective
copyright protection scheme of DIBR images remains a
challenging task. Digital watermarking has been applied
with a great success...
Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, crypto-based algorithms and hybrid algorithms. In this study, the authors propose two crypto-based algorithms capable of providing con...
This paper presents a low complexity configurable semi-fragile watermarking scheme for content-based H.264/AVC authentication, which allows content-preserving manipulations such as video transcoding techniques, while it is very sensitive to content-changing and frame manipulations. A low cost spatial analysis is exploited to maximize robustness and...
Digital watermarking is one of the most powerful tools used in ownership and copyrights protection in digital media. This paper presents a blind digital video watermarking technique based on a combination scheme between the Discrete Wavelet transform in (DWT) and the real Schur Decomposition. The scheme starts with applying two-level DWT to the vid...
In this paper, we propose a semi-blind, imperceptible, and robust digital audio watermarking algorithm. The proposed algorithm is based on cascading two well-known transforms: the discrete wavelet transform and the singular value decomposition. The two transforms provide different, but complementary, levels of robustness against watermarking attack...
In this paper, a non-blind digital audio watermarking algorithm that satisfies the minimum requirements of optimal audio watermarking set by the International Federation of Photographic Industry (IFPI), is proposed. The algorithm does not degrade perception of audio, offers an SNR value of more than 44 dB, offers around 1387 bps data payload, and i...
The tremendous advancement of digital technology has increased the ease with which digital multimedia signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers and owners are faced with problems of protection against copyright violation and other forms of abuse to their digital property. Digital wate...
Many effective watermarking algorithms have been proposed and implemented for digital images and digital video, however, few algorithms have been proposed for audio watermarking. This is due to the fact that, the human audio system is far more complex and sensitive than the human visual system. In this paper, we describe an imperceptible and robust...
ABSTRACT: Audio watermarking is gaiing momentum in the recent years to embed copyright information in audio
signals as a proof of their ownership. The significance of audio watermarking has enabled to protect the illegal manipulation
of genuine audio sources. An efficient and scalable audio watermarking algorithm is designed and proposed in this st...
Due to the increasing use of databases in many real-life applications, database watermarking has been suggested lately as
a vital technique for copyright protection of databases. In this paper, we propose an efficient database watermarking algorithm
based on inserting a binary image watermark in Arabic character attributes. Experimental results dem...
Audio watermarking is a relatively new technology that aims to embed copyright information in audio signals as a proof of their ownership. The driving force behind this technology has been the ever-increasing illegal manipulation of genuine audio products released by the music industry. In this paper, we propose an effective, robust, and inaudible...
The ever-increasing illegal manipulation of genuine audio products has been a dilemma for the music industry. This situation calls for immediate, yet effective, solutions to avoid further financial losses and intellectual property violations. Audio watermarking has been proposed as a possible solution, since this technology embeds copyright informa...
The tremendous advancement of digital technology has increased the ease with which digital multimedia signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers and owners are faced with problems of protection against copyright violation and other forms of abuse to their digital property. Digital wate...
Digital watermarking is a process in which a secondary pattern or signature, called a watermark, is hidden into a digital media (e.g., image and video) such that it can be detected or extracted later for different intentions. Digital watermarking has many applications including copyright protection, authentication, tamper detection, and embedding o...
Copyright right protection of digital multimedia has been receiving considerable attention in the last decade. Many effective watermarking algorithms have been proposed and implemented for digital images and digital video, however, few algorithms have been proposed for audio watermarking. This is due to the fact that the human audio system (HAS) is...
Video watermarking is relatively a new technology that has been proposed to solve the problem of illegal manipulation and distribution of digital video. It is the process of embedding copyright information in video bit streams. In this paper, we propose two effective, robust and imperceptible video watermarking algorithms. The two algorithms are ba...
Advances in Internet technology have considerably facilitated the acquisition, representation, storage and distribution of images in digital format. These advances, however, made the unauthorized manipulation and reproduction of original digital images an easy process. Consequently, the design and development of effective digital image copyright pr...
Medical images of all types are produced in hospitals and health centers more than ever. The ease of production of medical images has been facilitated by the advancements in information and communication technologies. Traditional methods used to manage medical images fall short in coping with the great amount of information inherited in medical ima...
Video watermarking is a relatively new technology that has been proposed to solve the problem of illegal manipulation and distribution of digital video. By virtue of this technology, copyright information is embedded in the video data to provide ownership verification. In this paper, we propose an effective, robust, and imperceptible video watermar...
Problem statement: Digital multimedia watermarking technology was suggested in the last decade to embed copyright information in digital objects such images, audio and video. However, the increasing use of relational database systems in many real-life applications created an ever increasing need for watermarking database systems. As a result, water...
Problem statement: Video watermarking is well known as the process of embedding copyright information in video bit streams. It had been proposed in recent years to solve the problem of illegal manipulation and distribution of digital video. Approach: In this study, an effective, robust and imperceptible video watermarking algorithm was proposed. Th...
The excellent spatial localization, frequency spread and multi-resolution characteristics of the Discrete Wavelets Transform (DWT), which were similar to the theoretical models of the human visual system, facilitated the development of many imperceptible and robust DWT-based watermarking algorithms. There had been extremely few proposed algorithms...
Watermarking relational databases is an emerging research area that deals with the legal issue of copyright protection of relational databases. In this paper, we propose an efficient database watermarking algorithm based on inserting a binary image watermark in the dasiatimepsila attribute of database tuples. Experimental results demonstrate the ro...
The discrete wavelet transform is used extensively as a basis for efficient digital image watermarking. However, most wavelets-based watermarking algorithms failed to provide perceptual transparency and robustness simultaneously, since these two watermarking requirements are conflicting requirements. In this paper, we treat the image watermarking p...
Efficient multimedia communications rely on real-time implementations of multirate filter banks. In this paper, we describe a field programmable gate array (FPGA) implementation of the analysis and synthesis filter banks which are the fundamental components of multirate systems. The implementation utilizes parallel distributed arithmetic which enab...
Artificial Neural Networks are highly parallel structures inspired by the human brain. They have been used successfully in many human-like applications, such as pattern recognition. Performance of these Networks can be enhanced if used properly in conjunction with equally powerful mathematical tools. In this paper, we used the discrete wavelet tran...
Multimedia communications require efficient and real-time implementations of multiratedigital signal processing systems. The backbone structures of multirate systems are digital multiratefilter banks. Therefore, efficient multimedia communications rely, in the first place, on real-timeimplementations of multirate filter banks. In this paper, we des...
One of the most efficient multi-rate digital signal decomposition structures is the quadrature mirror filter (QMF) bank.It has been used successfully to implement subband coding applications such as speech coding and image compression. In this paper, we report on several efficient FPGA-based implementations of the basic quadrature mirror filter ban...
In the last decade, many digital image watermarking algorithms have been proposed and implemented; however, algorithms based on the discrete wavelet transform (DWT) have been widely recognized to be more prevalent than the others. This is due to the wavelets' excellent spatial localization, frequency spread, and multiresolution characteristics, whi...
In the last decade, many digital image watermarking algorithms have been proposed and implemented; however, algorithms based on the discrete wavelet transform (DWT) have been widely recognized to be more prevalent than the others. This is due to the wavelets’ excellent spatial localization, frequency spread, and multiresolution characteristics, whi...
Digital image watermarking is an emerging copyright protection technology. It aims at asserting intellectual property rights of digital images by inserting a copyright identifier in the contents of the image, without sacrificing its quality. In this paper, we propose an imperceptible and a robust digital image watermarking algorithm. The algorithm...
Copyright protection of digital media has become a major concern for owners and providers of digital media such as images, audio, and video products. To provide the required copyright protection, watermarking has recently emerged as a major technology, offering many algorithms and techniques that have different characteristics and effectiveness. In...
The fine grained parallelism inherent in Field Programmable Gate Arrays (FPGAs) may be well exploited to implement the computation-intensive discrete wavelet transform, which is increasingly employed in multimedia consumer electronics. In this paper, we describe a parallel implementation of the discrete wavelet transform and its inverse using Virte...
In this paper, we describe an efficient high-speed implementation of the well-known arithmetic coding algorithm. The implementation is based on mapping the multiply-intensive computation of the arithmetic coding algorithm, on the embedded-multiplier rich, Xilinx Virtex FPGAs. The reported configurable hardware implementation accelerates the executi...
The smoothed particle hydrodynamics (SPH) is an efficient method used in the simulation of a strophysical systems. The most computation-intensive part of SPH is the process of generating neighbours lists for all particles in the simulated astrophysical system. In this paper, we propose two computation-efficient approaches to generate neighbours lis...
The discrete wavelet transform has gained the reputation of being a very effective sig-nal analysis tool for many practical applications. However, due to its computation-intensive na-ture, current implementations of the transform fall short of meeting real-time processing re-quirements of most applications. This paper describes a parallel implement...
ASIC hardware implementations of the discrete wavelet transform are required to cope with the intensive real-time computations of the transform. In this paper, we describe a parallel implementation of the wavelet transform using one type of programmable ASICs; Filed Programmable Gate Arrays (FPGAs). The implementation is based on reformulating the...
The data-driven model of computation is well suited for flexible and highly parallel simulation of neural networks. First, the operational semantics of data-driven languages preserve the locality and functionality of neural networks, and naturally describe their inherent parallelism. Second, the asynchronous data-driven execution facilitates the im...
High speed simulation of neural networks can be achieved through parallel implementations capable of exploiting their massive inherent parallelism. In this paper, we show how this inherent parallelism can be effectively exploited on parallel data-driven systems. By using these systems, the asynchronous parallelism of neural networks can be naturall...
Data-driven computers are scalable, highly concurrent machines.
They have been proposed as an alternative to the conventional von
Neumann computers to allow for maximal exploitation of parallelism in
large-scale computations. The authors describe a parallel implementation
of the backpropagation learning algorithm on a data-driven computer
using the...
ASIC hardware implementations of the discrete wavelet transform are required to cope with the intensive real-time computations of the transform. In this paper, we describe a parallel implementation of the wavelet transform using one type of reconfigurable ASICs; Filed Programmable Gate Arrays (FPGAs). The implementation is based on reformulating th...