O. Zahran

O. Zahran
Menoufia University · Electronics & Electrical Communications Engineering

Doctor of Philosophy

About

166
Publications
62,432
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,040
Citations
Introduction
My current research involves augmented reality, renewable energy, medical image processing, fatigue detection, artificial intelligence, pattern recognition, development of signal and image processing techniques for the automated processing of non-destructive testing data, image and video transmission over wireless channels, mobile communications, security of wireless networks, information hiding and steganography, encryption, compression, radiography industrial application, and radar imaging.
Additional affiliations
April 2019 - present
Menoufia University
Position
  • Professor
Education
September 2001 - September 2006
University of Liverpool
Field of study
  • Electronic Engineering

Publications

Publications (166)
Article
Medical imaging and telemedicine are progressively employed on a large scale these days. The utilization of lossless compression techniques for medical image storage and transmission may not provide significant benefits in terms of data reduction. On the other hand, the utilization of lossy compression techniques may lead to loss of essential data,...
Article
Full-text available
In the literature, numerous techniques have been employed to decrease noise in medical image modalities, including X-Ray (XR), Ultrasonic (Us), Computed Tomography (CT), Magnetic Resonance Imaging (MRI), and Positron Emission Tomography (PET). These techniques are organized into two main classes: the Multiple Image (MI) and the Single Image (SI) te...
Article
Full-text available
This paper presents a study of the segmentation of medical images. The paper provides a solid introduction to image enhancement along with image segmentation fundamentals. In the first step, the morphological operations are employed to ensure image detail protection and noise-immunity. The objective of using morphological operations is to remove th...
Article
Full-text available
The segmentation process requires separating the image region into sub-regions of similar properties. Each sub-region has a group of pixels having the same characteristics, such as texture or intensity. This paper suggests an efficient hybrid segmentation approach for different medical image modalities based on particle swarm optimization (PSO) and...
Article
Full-text available
Outdoor images and videos suffer from several problems, such as the hazing problem due to the particles of dust, smoke, and other particles in the atmosphere. Videos in such atmospheric conditions are subject to visible quality degradations, such as low contrast and information loss. This paper presents a dehazing algorithm that enhances the video...
Article
Full-text available
Integration of Ethernet passive optical network and WiMAX technologies is viewed as a great solution for next-generation broadband access networks. In the systems adopting this strategy, weighty bandwidth allocation schemes are fundamental to fulfill the quality of service and fairness requirements of different traffic classes. Existing proposals t...
Preprint
This paper proposes a simplified fractal image compression algorithm which is implemented on a block by block basis. This algorithm achieves a compression ratio of up to 1:10 with a peak signal to noise ratio (PSNR) as high as 35dB. The idea of the proposed algorithm is based on the segmentation of the image, first, into blocks to setup reference b...
Preprint
Transfer learning appears to be a potential method for transferring information from general to specialized activities. Unfortunately, experimenting using various transfer learning models does not yield good results. In this paper, we propose the utilization of the Hough transform (HT) to improve modulation format recognition. HT is utilized to est...
Article
Full-text available
The focus of most research nowadays in the field of communication technology is on increasing bandwidth in wireless connectivity. Adaptive modulation can be used to enhance efficiency of communication systems. Adaptive modulation requires modulation format identification (MFI) at the receiver side to avoid the overhead required to determine the mod...
Article
Full-text available
Coronavirus (COVID-19) infection was initially acknowledged as a global pandemic in Wuhan in China. World Health Organization (WHO) stated that the COVID-19 is an epidemic that causes a 3.4% death rate. Chest X-Ray (CXR) and Computerized Tomography (CT) screening of infected persons are essential in diagnosis applications. There are numerous ways t...
Preprint
Full-text available
Integration of Ethernet passive optical network (EPON) and WiMAX technologies is viewed as a great solution for next-generation broadband access networks. In the systems adopting this strategy, weighty bandwidth allocation schemes are fundamental to fulfil the quality of service (QoS) and fairness requirements of different traffic classes. Existing...
Article
Full-text available
This paper presents a new trend in biometric security systems, which is cancelable multi-biometrics. In general, traditional biometric systems depend on a single biometric for identification. These traditional systems are subject to different types of attacks. In addition, a biometric signature may be lost in hacking scenarios; for example, in the...
Article
Full-text available
Optical wireless communication (OWC) technology is one of several alternative technologies for addressing the radio frequency limitations for applications in both indoor and outdoor architectures. Indoor optical wireless systems suffer from noise and intersymbol interference (ISI). These degradations are produced by the wireless channel multipath e...
Article
Full-text available
Differential equations are commonly used to model several engineering, science, and biological applications. Unfortunately, finding analytical solutions for solving higher-order Ordinary Differential Equations (ODEs) is a challenge. Numerical methods represent a leading candidate for solving such ODEs. This work presents an innovated adaptive techn...
Preprint
Full-text available
This paper suggests a chaotic Baker interleaving method for minimizing the channel errors on the transmitted data and setting some encryption. The evaluation of the suggested approach is checked by the transmission of various SVD watermarked video frames over Rayleigh fading channels in the presence of additive white Gaussian noise with interleavin...
Preprint
Full-text available
Three-Dimensional Video (3DV) communication through wireless channels suffers from bit-streams losses. Therefore, the efficient performance of 3DV transmission techniques over wireless networks is a considerable hot research topic. A high compression ratio must be introduced to meet future bandwidth restriction for optimized 3DV transmission. Unfor...
Article
Full-text available
The iris has been vastly recognized as one of the powerful biometrics in terms of recognition performance, both theoretically and empirically. However, traditional unprotected iris biometric recognition schemes are highly vulnerable to numerous privacy and security attacks. Several methods have been proposed to generate cancellable iris templates t...
Article
Full-text available
In this paper, a study of the segmentation of medical images is presented. The paper provides a solid introduction to image enhancement along with image segmentation fundamentals. Firstly, the local spatial information of the image is enhanced with morphological operations to ensure noise-immunity and image detail protection. The objective of using...
Article
Full-text available
Segmentation and classification of ultrasonic breast images is extremely critical for medical diagnosis. Over the last years, various techniques have already been presented for this objective. In this paper, a proposed framework is presented to segment a given ultrasonic image with breast tumor and classify the tumor as being benign or malignant. T...
Article
Full-text available
Anomaly detection is a very vital area in medical signal and image processing due to its importance in automatic diagnosis. This paper presents three efficient anomaly detection approaches for applications related to Electroencephalogram (EEG) signal processing and retinal image processing. The first approach depends on the utilization of Scale-Inv...
Preprint
In this paper, a study of the segmentation of medical images is presented. The paper provides a solid introduction to image enhancement along with image segmentation fundamentals. Firstly, the local spatial information of the image is enhanced with morphological operations to ensure noise-immunity and image detail-protection. The objective of using...
Article
Full-text available
In this paper, a study of the segmentation of medical images is presented. The paper provides a solid introduction to image enhancement along with image segmentation fundamentals. Firstly, the local spatial information of the image is enhanced with morphological operations to ensure noise-immunity and image detail protection. The objective of using...
Article
Full-text available
Segmentation and classification process of ultrasonic breast images is extremely critical for medical analysis and interpretation. Over the last time, various techniques have already been proposed. In this paper, a proposed framework is presented to segment a given ultrasonic breast tumor image and classify the tumor as benign or malignant. The...
Conference Paper
Full-text available
Fractal image compression has been studying during the last years for compressing images by using their self-similarity. The main advantages of fractal compression are, achieves a higher compression ratio and preserves the image resolution, but it lacks expensive computational cost searching the domain pool. To overcome this limitation and keeping...
Article
Full-text available
Segmentation and classification process of ultrasonic breast images is extremely critical for medical analysis and interpretation. Over the last time, various techniques have already been proposed. In this paper, a proposed framework is presented to segment a given ultrasonic breast tumor image and classify the tumor as benign or malignant. The pro...
Conference Paper
Physical security at nuclear facilities is an important licensing and design consideration. The ultimate objective of the physical protection system (PPS) is to prevent the accomplishment of unauthorized overt or covert actions to nuclear facilities and nuclear materials. When a physical protection system is applied to a nuclear facility or to nucl...
Article
Efficient equalization for nonlinear communication channels with Additive White Gaussian Noise (AWGN) is presented. The proposed equalization is based on a Functional Link Artificial Neural Network (FLANN) structure in which the original input is nonlinearly expanded. The proposed nonlinear expansion follows a polynomial series. The nonlinearity in...
Article
Full-text available
Now many security systems depend on biometrics, these systems have suffered from hacking trials. If the biometric databases have been hacked and stolen, the biometrics saved in these databases will be lost forever. Thus, there is a desperate need to develop new cancelable biometric systems. The main concept of cancelable biometrics is to use anothe...
Article
Integration of Ethernet passive optical network (EPON) and WiMAX technologies is regarded as a promising solution for next-generation broadband access networks. In implementing such networks, efficient bandwidth allocation schemes are essential to satisfy quality of service (QoS) and fairness requirements of various traffic classes. Existing propos...
Article
Fractal image compression has been studying during the last years for compressing images by using their self-similarity. The main advantages of fractal compression are, achieves a higher compression ratio and preserves the image resolution, but it lacks expensive computational cost searching the domain pool. To overcome this limitation and keeping...
Conference Paper
Integration of Ethernet passive optical network (EPON) and WiMAX technologies is regarded as a promising solution for next-generation broadband access networks. In implementing such networks, efficient bandwidth allocation schemes are essential to satisfy quality of service (QoS) and fairness requirements of various traffic classes. Existing propos...
Article
Full-text available
This paper presents a proposed algorithm for discriminating neutron and gamma radiation events. In the proposed algorithm, discriminating features are extracted from the input radiation event. These features are extracted using charge integration, matched filtering, and Discrete Wavelet Transform (DWT) methods. The extracted features are then fed i...
Article
Full-text available
Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single biometric for verification. The security problem arises from the utilization of the original biometrics in databases. So, if these databases are attacked, the biometrics are lo...
Article
Full-text available
This paper presents a fingerprint image encryption scheme based on fingerprint image fusion with another visible image that is rich in details. The encryption process is performed with chaotic Baker map, which has large immunity to noise. The image fusion process is performed with the Haar wavelet transform, and it can be implemented with the avera...
Article
Full-text available
Anomaly detection is a very vital area in medical signal and image processing due to its importance in automatic diagnosis. This paper presents three efficient anomaly detection approaches for applications related to Electroencephalogram (EEG) signal processing and retinal image processing. The first approach depends on the utilization of Scale-Inv...
Article
Full-text available
In this paper, hybrid models for image quality enhancement are presented comprising both Contrast Limited Adaptive Histogram Equalization (CLAHE) and image interpolation. Adaptive histogram equalization is employed for contrast enhancement, while image interpolation is employed for resolution enhancement. Both the CLAHE and image interpolation are...
Article
Full-text available
The streaming of Three-Dimensional Video (3DV) through erroneous wireless channels causes Macro-Blocks (MBs) corruptions. Thus, the robust performance of 3DV communication techniques over wireless channels has become a hot research topic because of the restricted resources and the existence of severe communication losses. The 3DV consists of multip...
Article
In nuclear applications related to radiation energy measurement, digital pulse processing for fast sampling facility has great advantages compared to the traditional analog pulse processing. A distortion in energy spectrum and degradation in timing resolution take place when pulse pile-up occurs. This in turn leads to degradations of the signals us...
Article
Full-text available
Three-Dimensional Multi-View Video (3D-MVV) transmission over wireless networks suffers from losses. Therefore, the robust performance of 3D-MVV transmission techniques over wireless channels has become a recent hot research issue due to the restricted resources and the presence of severe channel errors. The 3D-MVV is composed of multiple video str...
Article
Full-text available
This paper presents a fabulous enhancement approach for infrared (IR) images. This approach mixes the benefits of the undecimated Additive Wavelet Transform (AWT) with the homomorphic transform and Contrast Limited Adaptive Histogram Equalization (CLAHE). The basic idea of this approach depends on applying the CLAHE on the IR image. Then, the resul...
Article
In this paper, hybrid approaches for quality enhancement of images compiled from Contrast Limited Adaptive Histogram Equalization (CLAHE) and image interpolation are presented. Adaptive histogram equalization is employed for contrast enhancement, while image interpolation is used for resolution enhancement. Both the CLAHE and image interpolation ar...
Article
This paper presents two chaotic image encryption plans combined with Discrete Wavelet Transform (DWT) to encrypt unique fingerprint. In the first proposal, the fingerprint which has few details (low entropy) is fused with another image which is rich in details (high entropy) using the Discrete Wavelet Transform (DWT) prior to encryption. The fusion...
Article
Segmentation requires the separation or division of an image into regions of similar properties. Image amplitude is the most basic attribute for image segmentation. Image texture and edges are also useful properties for the segmentation process. There is no standard approach for segmentation of an image; no single theory for image segmentation. Seg...
Article
The generalized exploiting modification direction (GEMD) steganography algorithm is an enhancement of the exploiting modification direction (EMD) algorithm to hide a high payload capacity with maintaining the quality of the stego-image. This paper proposed a developed GEMD image steganography algorithm using improved pixel segmentation strategy wit...
Article
The rapid development of data communication in modern era demands secure exchange of information. Steganog-raphy is an established method for hiding secret data from an unauthorized access into a cover object in such a way that it is invisible to human eyes. The cover object can be image, text, audio, or video. This paper proposes a secure steganog...
Article
Full-text available
Performance evaluation of ultra wideband (UWB) radar in terms of target detection, resolution, recognition, and clutter and interference rejection depends on the structure of the radar waveform. The chirp waveform, which is commonly used in radar applications, has high time sidelobes in the level of − 20 dB. Another limitation is the excessive rang...
Article
Full-text available
Due to the need to transmit encrypted data and video securely through wireless channels, we suggest the application of the double random phase encryption (DRPE) algorithm for efficient video communication over orthogonal frequency division multiplexing (OFDM) system. Moreover, we use an efficient interleaving mechanism on the communicated data depe...
Article
Full-text available
This paper presents an efficient video compression and transmission scheme based on the Set Partitioning In Hierarchical Trees (SPIHT) algorithm and chaotic Baker map interleaving. The compressed video frames have self-embedded digital signatures, and the transmission is performed over Orthogonal Frequency Division Multiplexing wireless systems wit...
Article
Full-text available
Three-Dimensional Multi-View Video (3D-MVV) transmission over wireless networks suffers from Macro-Blocks losses due to either packet dropping or fading-motivated bit errors. Thus, the robust performance of 3D-MVV transmission schemes over wireless channels becomes a recent considerable hot research issue due to the restricted resources and the pre...
Article
Full-text available
There are many different data hiding techniques, the Least Significant Bit (LSB) based steganography algorithm is considered as one of the most popular algorithms in the spatial domain. In this paper, the proposed algorithm embeds data in each component of color image, where the signature of the transmitter and the length of the secret text are hid...