Moussa H Abdallah

Moussa H Abdallah
Princess Sumaya University for Technology · Electronics Engineering

Ph.D. in Electrical Engineering

About

25
Publications
9,519
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
314
Citations
Additional affiliations
September 2003 - August 2004
University of Jordan
Position
  • Professor (Associate)

Publications

Publications (25)
Article
Full-text available
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security and to increase the payload. Both are important parameters in information hiding. The proposed techniques provide three levels of security...
Article
Full-text available
Problem statement: High speed operational amplifier is always an on-going research topic since major high speed application are needed. Approach: A two-stage operational amplifier (op amp) is designed, simulated and fabricated using a UMC 0.5 μm 2P2M CMOS technology. Results: This chip includes a compensation technique to ensure stability and zero...
Article
Full-text available
Problem statement: The issue of having robust and fragile watermarking is still main focus for various researchers worldwide. Performance of a watermarking technique depends on how complex as well as how feasible to implement. These issues are tested using various kinds of attacks including geometry and transformation. Watermarking techniques in co...
Article
Full-text available
Problem statement: Filters are widely used in various applications including communications, electronics and biomedical engineering. The performance and size of the filter is of interest especially in chip implementation. A switched-capacitor low-pass filter was designed and simulated using a 0.18 μm 1P6M CMOS technology. Approach: This circuit des...
Article
Full-text available
Problem statement: With the rapid advancement in information technology and communications, computer systems increasingly offer the users the opportunity to interact with information through speech. The interest in speech synthesis and in building voices is increasing. Worldwide, speech synthesizers have been developed for many popular languages En...
Article
Image watermarking techniques have been widely studied since the need for copyright protection. In this paper, we present a method for digital image watermarking using the biorthogonal wavelet transform. The method is based on decomposing an image using the Discrete Wavelet Transform (DWT), and then embedding a watermark into significant coefficien...
Article
Full-text available
Both cryptography and steganography are usually used to ensure information safety in today's data communication. This paper makes use of both concepts and presents a multimedia multilevel hiding technique. This technique hides more than one colored encrypted image with encrypted data in a meaningful colored cover image. The hidden secret images wit...
Article
Full-text available
Problem Statement: Breast cancer is the second leading cause of cancer deaths in women today after lung cancer and is the most common cancer among women. The development of efficient technique to early detect the region of microcalcifications mammogram images is a must. Approach: The method proposed in this paper is to enhance the Computer Aided Di...
Article
Full-text available
PET is an imaging technique that shows the anatomical structure and the physiological functions of certain tissues, but it suffers from blurriness and low spatial resolution. Detecting boundary information in PET images without any prior knowledge from any other modality is the purpose of this paper. In this paper two high order derivative systems...
Conference Paper
Image watermarking techniques have been widely studied since the need for copyright protection. In this paper, we present a method for image watermarking using the biorthogonal wavelet transform. The method is based on decomposing an image using the discrete wavelet transform (DWT), and then embedding a watermark in the most significant coefficient...
Conference Paper
In this paper we propose a novel method for watermarking. It uses the spatial and the discrete cosine transform (DCT) Domains. The proposed method deals with colored images in the biological color model, the Hue, Saturation, and Intensity (HSI). The method robustness is tested against several attacks. Watermark security is increased by using the Ha...
Article
Full-text available
An automatic speech recognition system for the formal Arabic language is needed. The Quran is the most formal spoken book in Arabic, it is spoken all over the world. In this research, an automatic speech recognizer for Quranic based speaker- independent was developed and tested. The system was developed based on the tri-phone Hidden Markov Model an...
Article
Full-text available
The high incidence of breast cancer in women has increased significantly in the recent years. The most familiar breast tumors types are mass and microcalcification. Mammograms—breast X-ray—are considered the most reliable method in early detection of breast cancer. Computer-aided diagnosis system can be very helpful for radiologist in detection and...
Article
Time-delay estimation process is developed in the transform domain where discrete cosine transform (DCT) coefficients of time-varying delay signals are estimated. The DCT is very efficient in compacting the signal energy in a small number of coefficients. Hence, estimation of time-varying delay is obtained through calculation of small number of DCT...
Article
Time-delay estimation is developed in the transform domain where discrete cosine transform (DCT) coefficients of time-varying delay signals are estimated. The DCT is very efficient in compacting the signal energy in a small number of coefficients. Hence, the estimation of time-varying delay is obtained through the calculation of a small number of t...
Conference Paper
The authors introduce an efficient technique to detect the evoked potential, EP, transients. A hybrid algorithm using Daubechies (1990, 1994) as the father and Coiflet as the mother wavelet is employed on both a single and four-averaged EP sweeps. A 60% reduction in the number of sweeps with a high quality performance has been achieved when compare...
Conference Paper
A neuro hierarchial approach based on an adaptive back-propagation algorithm is proposed. In a separate preprocessing step, the input and the output vector are generated using the encoded-sequence representation. The algorithm is applied to translate the American sign language from spoken words. Experimental results indicate that this approach resu...
Conference Paper
One of the most important task which can be implemented by an automatic monitor of cardiac arrhythmias is the reliable detection of those arrhythmias which represent a serious threat to the patient. Among these, ventricular arrhythmias occupy a primary place, and in particular ventricular fibrillation (VF), ventricular tachycardia (VT) and atrial f...
Conference Paper
The author presents an encoded sequence approach to represent output vectors in multilayer networks. The new method is applied to a multilayer network with one hidden layer to classify the letters A to J. Since patterns are represented as sequences rather than individual node outputs, the circular Hamming distance (CHD) operator is proposed to prev...
Article
The traditional back-propagation training algorithm (BP) is an iterative gradient descent algorithm designed to minimize the mean square error between the actual output of a multilayer feedforward perceptron and the desired output. It is highly accurate for most classification problems but it is time consuming and computer intensive. An adaptive ap...
Article
Presented in this paper is a simulation algorithm for the optimisation of camera position with respect to the signer, to have a full and reliable interpretation of the American Sign Language. The simulation includes a three-dimensional world point into two-dimensional image point transformation algorithm, the effect of the depth information loss an...
Article
Full-text available
Image applications have been increasing in recent years. Encryption is used to provide the security needed for image applications. Since images contain high volume of data, classical encryption techniques are not appropriate for image applications. Partial image encryption is the application of encryption to selected parts of an image. In this pape...

Network

Cited By