TELKOMNIKA (Telecommunication Computing Electronics and Control)
This paper proposes a modification approach for phased-based EVM in order to reduce the processin... more This paper proposes a modification approach for phased-based EVM in order to reduce the processing time without effect the quality of the magnified video. The proposed approach applies a resizing process on the input video using Lanczos-3 algorithm. Then, it decomposes video frames using steerable pyramid to obtain multi-scale frame with its orientation. Subsequently, the resulted frames are filtered by temporal filters for specific bands and the filtered frames are multiplied by a magnification factor. Now, both the magnified regions and the unmagnified regions for each frame are added together. Finally, reconstructing the produced magnified multi-scale frames using the inverse steerable pyramid. The experimental results show that superiority of the proposed approach compares to the conventional phase-based EVM in processing time, where the processing time reduction about 60-65%. Furthermore, this approach does not affect on the video quality, which maintain it in the boundary of the conventional Phase-based EVM.
The proposed device represents a new design and implementation of a smart system that helps blind... more The proposed device represents a new design and implementation of a smart system that helps blind and elderly people. The system can provide several services such as alert a blind person to avoid collision and calling family and/or ambulance automatically in emergency cases. Furthermore, the system can send SMS (short message service), which consists of the current position of the disabled person. Moreover, the family and any known phone numbers to the system can easily localize the position of the system user via automatic replied SMS at any time. The system has been implemented by employing new technologies such as microcontroller, Global Positioning System (GPS), Global System for Mobile communications (GSM), gyroscope, and ultrasonic transceiver. The implemented system operates as standalone without need for any special servers and centers. Furthermore, it has been tested for realistic environment and it is identical and efficient for the real time requirements. The cost of the laboratory implemented system is less than 75 USD, and we hope the cost of the industrial one will be lesser with less weight.
Covert communication model for speech signals based on an indirect and adaptive encryption technique
Computers & Electrical Engineering
This study proposes an indirect speech encryption technique that applies the chameleon style. A c... more This study proposes an indirect speech encryption technique that applies the chameleon style. A chameleon adapts its skin colour according to its surrounding environment to protect itself from its enemies. The proposed model adapts the wavelet coefficients of a secret speech to any other speech signal coefficients to make them similar. Subsequently, the vector to the adaptation that involves the original positions of the secret speech samples is sent to the receiver instead of the encrypted message or cover speech. The proposed method does not send the encrypted contents of the secret speech (such as that in traditional encryption) nor extends the bandwidth of the transmitted messages (such as that in a steganographic system). The proposed technique has been tested on several speech signals, and the reconstructed speeches have produced sounds that are similar to the original speeches with a normalised correlation of over 95%. Moreover, the model is robust against plaintext and ciphertext attackers. The proposed technique can be used in applications that require high-level security, such as military and intelligence communications.
International Journal of Electrical and Computer Engineering (IJECE), 2020
Digital video magnification is a computer-based microscope, which is useful to detect subtle chan... more Digital video magnification is a computer-based microscope, which is useful to detect subtle changes to human eyes in recorded videos. This technology can be employed in several areas such as medical, biological, mechanical and physical applications. Eulerian is the most popular approach in video magnification. However, amplifying the subtle changes in video produces amplifying the subtle noise. This paper proposes an approach to reduce amplified noise in magnified video for both type of changes amplifications, color and motion. The proposed approach processes the resulted video from Eulerian algorithm whether linear or phase based in order to noise cancellation. The approach utilizes wavelet denoising method to localize the frequencies of distributed noise over the different frequency bands. Subsequently, the energy of the coefficients under localized frequencies are attenuated by attenuating the amplitude of these coefficients. The experimental results of the proposed approach show its superiority over conventional linear and phase based Eulerian video magnification approaches in terms of quality of the resulted magnified videos. This allows to amplify the videos by larger amplification factor, so that several new applications can be added to the list of Eulerian video magnification users. Furthermore, the processing time does not significantly increase, the increment is only less than 3% of the overall processing compare to conventional Eulerian video magnification. Keywords: De-noising based wavelet transform Eulerian video magnification (EVM) Linear-based (LB-EVM) Motion magnification Phase-based (PB-EVM)
Recent developments in communication and information technologies, plus the emerging of the Inter... more Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high capacity data communication model is proposed to protect the transmitted data based on identical frames between a secret and cover data. In this model, the cover data does not convey any embedded data (as in normal steganography system) or modify the secret message (as in traditional cryptography techniques). Alternatively, the proposed model sends the positions of the cover frames that are identical with the secret frames to the receiver side in order to recover the secret message. One of the significant advantages of the proposed model is the size of the secret key message which is considerably larger than the cover size, it may be even hundred times larger. Accordingly, the experimental results demonstrate a superior performance in terms of the capacity rate as compared to the traditional steganography techniques. Moreover, it has an advantage in terms of the required bandwidth to send the data or the required memory for saving when compared to the steganography methods, which need a bandwidth or memory up to 3-5 times of the original secret message. Where the length of the secret key (positions of the identical frames) that should be sent to the receiver increases by only 25% from the original secret message. This model is suitable for applications with a high level of security, high capacity rate and less bandwidth of communication or low storage devices.
In public communication networks such as the internet, users can easily share and access multimed... more In public communication networks such as the internet, users can easily share and access multimedia products such as images, videos, and audios. Copyright protection is a vital issue to prove the ownership of products in these networks. Consequently, digital watermarking that hide invisible watermark or logo plays a significant role in overcoming copyright issue. However, any person has access to multimedia products can simply use these products. Also, there are professional attackers can remove the watermark or logo without loss the visibility of the multimedia product and claim their ownership for the digital products. This study proposes an image watermarking model that only allows authorized users to use the watermarked image. This model is robust against crop and rotation attacks. It is based on the proposed embedding method that we named a "concentric rectangles", which embeds data in rectangles starting from the center toward outer boundary to overcome the crop and rotation attacks. The resulted watermarked image is distorted in such a way to be recognized by any user, but only the authorized one can obtain a high quality of the watermarked image. The experimental results of the proposed model show that the embedding capacity can reach up to 25% from the size of the host image with watermarked image quality above 40 dB in terms of peak signal to noise rotation (PSNR). Furthermore, the proposed model is fully retrieval for the watermark image (logo) and the logo still retrieved a with a recognized vision until 10 dB of signal to noise ratio of noise adding.
Video compression is a process of reducing the size of a video file without degrading the video q... more Video compression is a process of reducing the size of a video file without degrading the video quality. There is a great deal of redundancy between frames of a video sequence. There is also redundancy with in the image of a single frame of a video sequence. In order to achieve the compression operation, one must reduce these redundancies using various techniques. Motion estimation techniques are used to reduce temporal redundancy between sequence frames. The technique that is used is block matching algorithm. The idea behind the proposed system to reduce spatial redundancy depends on the application of two level 2D-DWT on the error residual signal before estimating the motion between frames; A value of threshold is assigned to the coefficients of each layer, the resulting coefficients are quatized using the proposed quantizer and encoded using the EZW algorithm. Two digital video samples with different motions (simple, complex) are used in testing the system with different thresholds. The results of compression ratio, resolution of decompressed video, and required processing time are compared. Some of the reconstructed frames are shown. All the programs and graphics are executed using MATLAB version R2008a.
The demand for more spectrums in a smart grid communication network is a significant challenge in... more The demand for more spectrums in a smart grid communication network is a significant challenge in originally scarce spectrum resources. Cognitive radio (CR) is a powerful technique for solving the spectrum scarcity problem by adapting the transmission parameters according to predefined objectives in an active wireless communication network. This paper presents a cognitive radio decision engine that dynamically selects optimal radio transmission parameters for wireless home area networks (HAN) of smart grid applications via the multi-objective differential evolution (MODE) optimization method. The proposed system helps to drive optimal communication parameters to realize power saving, maximum throughput and minimum bit error rate communication modes. A differential evolution algorithm is used to select the optimal transmission parameters for given communication modes based on a fitness function that combines multiple objectives based on appropriate weights. Simulation results highlight the superiority of the proposed system in terms of accuracy and convergence as compared with other evolution algorithms (genetic optimization, particle swarm optimization, and ant colony optimization) for different communication modes (power saving mode, high throughput mode, emergency communication mode, and balanced mode).
In this study, a novel and high embedding capacity audio steganography scheme based on Lifting Wa... more In this study, a novel and high embedding capacity audio steganography scheme based on Lifting Wavelet Transform (LWT) and adaptive embedding positions is proposed. Specifically, the message data is inserted in the imperceptible positions that chosen from the coefficients of detail sub-bands taking advantage of our proposed Weighted Block Matching (WBM). The WBM is preceded by preparing the cover audio in order to select the bitspositions that can possibly be used for embedding from each detail coefficient based on coefficient amplitude then copy the contents of the selected bits-positions and arrange them in blocks of bits. Also, the message data is arranged in blocks of bits after preprocessed and encrypted. The WBM computes the matching between each message block and whole extracted cover blocks to find the similarity between them. This process help to provide optimal locations to hide the message blocks. These locations are considered as a stego-key that is ciphered and hided within the final detail sub-band which is specified for this purpose. The proposed approach attains higher security than other fixed embedding positions approaches because the random positions for the embedded message blocks based on adaptive selection for embedding positions. Experimental results show that the proposed technique is not only has very high embedding capacity (exceed 300 kbps) with excellent transparency (above 35 dB for the cover to noise ratio), but also achieve lossless massage retrieved. Comparisons with the related audio steganography algorithms also show that our proposed scheme outperforms all the selected algorithms.
Analysis of Wavelet Based Audio Steganography Algorithms in-Term of Full Hiding Message Recovery
Steganography is the art of hiding a secret message on a host signal without attracting attention... more Steganography is the art of hiding a secret message on a host signal without attracting attention. Full recovery means that a legal receiver can retrieve the hiding secret message from the host signal without any distortion. For audio steganography algorithms that based on convolution Discrete Wavelet Transform (DWT), an input audio host data have to convert several times from integer to floating and vice versa during the hiding process. These conversions (data type conversions) require data rounding because representation of transformed host data in larger number of bits per sample than original one of the input host audio signal. The final audio output should be saved or transmitted by its original resolution (number of bits/sample). As a result, there are some lost in embedded data may be happened because these data rounding. In other word, an extracted secret message at the receiver side might have some errors. This paper presents an analysis in-term of full message recovery for some audio steganography that based on wavelet transform. In addition, we implemented and tested several audio steganography algorithms to find the Bit Error Rate (BER) in the retrieved data after saving the audio stego-signals (host signal that consists embedded information) as a WAV file in 16 bits/sample of resolution, and then we use them as an input signal to the recovery algorithm. The results show that all convolution based DWT audio steganography methods have lost in their retrieved secret message especially for high embedding rate. The reason for this information lost in message recovery is the data type conversions. However, we find all audio steganograpy methods that employ integer to integer lifting scheme based DWT have error-free in the retrieved data for various embedding rate.
High Performance FPGA Architecture for Dual Mode Processor of Integer Haar Lifting-Based Wavelet Transform
Discrete Wavelet Transform (DWT) becomes a major part for many applications. Fast, low area, and ... more Discrete Wavelet Transform (DWT) becomes a major part for many applications. Fast, low area, and low power consumption hardware for DWT is necessary for some new technologies such as OFDM transceiver and wireless multimedia sensor networks. This paper presents efficient dual mode (decomposition and reconstruction) Integer Haar Lifting Wavelet Transform (IHLWT) architecture. The proposed architecture reduces the hardware requirements by exploiting the arithmetic operations redundancy which is involved in IHLWT computations. It is multiplier-free and it performs IHLWT with only a single adder and subtractor which have reconfigurable input buses to perform decomposition and reconstruction transformations. IEEE standard VHDL has been used to develop the proposed processor. This makes the design vendor independent and therefore easily portable across FPGA devices from multiple vendors. The generic design is flexible and can perform any arbitrary signal length. The synthesis of the processor showed that it requires low number of CLB-slices and low power consumption with high operating-frequency for various Xilinx FPGA devices. The processor has been successfully implemented and tested on Xilinx Spartan6-SP601 Evaluation Board. The implemented hardware has been tested in real time by using many recording audio signals. All the implemented hardware results were identical 100% with IHLWT software results.
Data hiding, a form of steganography, embeds data into digital media for the purpose of identific... more Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, security, and copyright. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. Digital audio provides a suitable cover for high-throughput steganography. At 16 bits per sample and sampled at a rate of 44100 Hz, digital audio has the bit-rate to support large color image messages. In addition, audio is often transient and unpredictable, facilitating the hiding of messages. In this paper a high robustness system against the attackers in hiding of color images is presented. We used the multi-resolution discrete wavelet transform in hiding process. The JPEG format type for color images and WAV format for speech cover signal that used in test of system .Programs and graphics are executed by using MATLAB version 6.5 programs.
… Assurance and Security (IAS), 2011 7th …, Jan 1, 2011
Steganography is an information hiding technique where secret message is embedded into unsuspicio... more Steganography is an information hiding technique where secret message is embedded into unsuspicious cover signal. Measurement of good steganography algorithm includes security, capacity, robustness and imperceptibility. These measures are contradicted, therefore improving one, affects the others. In this paper, we propose a new high capacity audio steganography algorithm based on the wavelet packet transform with adaptive hiding in least significant bits. The adaptive hiding is determined depend on the cover samples strength and bits block matching between message and cover signals. The results show that message can be embedded up to 42 % of the total size of the cover audio signal with at least of 50 dB signal to noise ratio.
Steganography is the art of message hiding in a cover signal without attracting attention. The re... more Steganography is the art of message hiding in a cover signal without attracting attention. The requirements of the good steganography algorithm are security, capacity, robustness and imperceptibility, all them are contradictory, therefore, satisfying all together is not easy especially in audio cover signal because human auditory system (HAS) has high sensitivity to audio modification. In this paper, we proposed a high capacity audio steganography algorithm with good resistance to additive noise. The proposed algorithm is based on wavelet packet transform and blocks matching. It has capacity above 35% of the input audio file size with acceptable signal to noise ratio. Also, it is resistance to additive Gaussian noise to about 25 db. Furthermore, the reconstruction of actual secret messages does not require the original cover audio signal.
Uploads
Papers by Haider Ismael