البحوث الخاصة بالتدريسي د. سالم محسن وادي

قائمة البحوث
  • عنوان البحث : CONTRAST ENHANCEMENT METHODS BASED ON HISTOGRAM EQUALIZATION TECHNIQUE: SURVEY

    ملخص البحث :

    Image enhancement techniques are used to emerge out hidden details in an image, or to increase the contrast in digital images. In other words, contrast enhancement techniques allow the important image features to be visible through increase the width of dynamic range. Although, the Histogram Equalization technique is more popular issue because of its effectiveness and simplicity, this technique suffers from some drawbacks, for example, change the image brightness and annoying artifacts. Therefore, number of methods are proposed depending on the histogram equalization to overcome these drawbacks. In this paper, a brief survey for most important methods based on histogram equalization used to enhance the image contrast are produced. The reviewed methods in this paper are categorized into three groups: partitioning histogram methods, dynamic range methods, and matching histogram methods.
    • سنة النشر : 2012
    • تصنيف البحث : other
    • تحميل

  • عنوان البحث : CONTRAST ENHANCEMENT METHODS BASED ON HISTOGRAM EQUALIZATION TECHNIQUE: SURVEY

    ملخص البحث :

    Image enhancement techniques are used to emerge out hidden details in an image, or to increase the contrast in digital images. In other words, contrast enhancement techniques allow the important image features to be visible through increase the width of dynamic range. Although, the Histogram Equalization technique is more popular issue because of its effectiveness and simplicity, this technique suffers from some drawbacks, for example, change the image brightness and annoying artifacts. Therefore, number of methods are proposed depending on the histogram equalization to overcome these drawbacks. In this paper, a brief survey for most important methods based on histogram equalization used to enhance the image contrast are produced. The reviewed methods in this paper are categorized into three groups: partitioning histogram methods, dynamic range methods, and matching histogram methods.
    • سنة النشر : 2012
    • تصنيف البحث : other
    • تحميل

  • عنوان البحث : Rapid Encryption Method Based on AES Algorithm for Grey Scale HD Image Encryption

    ملخص البحث :

    Ciphering is very important operation to preserve the confidentiality of digital images transmitted over public network spatially with rapidly growth in communication techniques. Advanced Encryption Standard (AES) is a famous and strong encryption algorithm which has several advantages in data ciphering. However, AES suffer from some drawbacks such as high computations, pattern in ciphered images, and hardware requirement. Those problems are more complicated when AES algorithm willusefor images ciphering especially the HD images. Some modifications were proposed in this paper to enhance the performance of AES algorithm in terms of time ciphering and pattern appearance. First modification is decreasing the number of rounds to one while the second modification is replace the S-box with new S-box to decrease the hardware requirements. Applying AES in one of the ciphering mode solves the pattern appearance problems. The experimental results indicate that the proposed modifications make AES algorithm faster while fulfill the security requirements.
    • سنة النشر : 2013
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : Grey scale image hiding method based on decomposition operation

    ملخص البحث :

    Capacity is one of the importance factors in the hiding techniques. The challenge facing of the concealment techniques is the inverse relationship between the capacity and quality of stego-image. The Least-Significant-Bit (LSB)-based approach is a popular hiding technique in the spatial domain. Number of methods was proposed to enhance the performance of LSB method. However, the capacity of most hiding approaches especially in spatial domain was little and not enough to hide image in image with same size and type. New disguise algorithm based on decomposition and LSB is proposed in this paper. Distorted image as cover image used in this paper to decrease the effect of increase the capacity. Secret image decomposed by binary bit planes and hide 5 bit most significant bit planes from 8. Bit planes are change in order to avoid the appearance of the scene of secret image in stego-image ordering. Experimental results show that the capacity of proposed method is perfect with high quality of recovered image and strong against statistical analysis.
    • سنة النشر : 2013
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : Decomposition by binary codes-based speedy image encryption algorithm for multiple applications

    ملخص البحث :

    The rapid growth in the use of multimedia information has made the security of data storage and transmission important in avoiding unlawful, unofficial, unauthorised and illegal use. Encryption is an efficient operation to protect multimedia data secret. A new image encryption approach that uses binary coded decimal (BCD) code-based decomposition, reordering and scrambling bit planes, and an encryption process is suggested in this study. Image decomposition using BCD code for image encryption is introduced in this study. A simple scrambling process is used to shuffle binary bit planes after re-ordering them. A shift column operation is applied to the image that is constructed after scrambling the bit planes to increase the security level. A performance analysis and a comparison with other encryption algorithms are conducted to prove the proposed algorithm's image encryption capabilities. The experimental results show that the suggested method protects secret images against common attacks with shorter encryption/decryption times.
    • سنة النشر : 2015
    • تصنيف البحث : thomson reuters
    • تحميل

  • عنوان البحث : A LOW COST IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD ALGORITHM USING 8085A MICROPROCESSOR

    ملخص البحث :

    The high security communication systems became an urgent need in recent years for both governments and peoples desiring protection from signal interception. The implementation of advanced encryption standard algorithm is important requirement where many researches proposed different items to this purpose. Some papers used microcontrollers as CPU item to implement AES algorithm. A simply item proposed in this paper to speedy, low cost implementation of Rijndael Advanced Encryption Standard (AES) cryptographic algorithm which is 8085A microprocessor. The results prove the implementation is effective through competitive cost, low hardware requirements, and reasonable speeds compared with other implementation methods.
    • سنة النشر : 2012
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : A LOW COST IMPLEMENTATION OF MODIFIED ADVANCED ENCRYPTION STANDARD ALGORITHM USING 8085A MICROPROCESSOR

    ملخص البحث :

    The high security communication systems became an urgent need in recent years for both governments and peoples desiring protection from signal interception. Advanced Encryption Standard (AES) is a famous block encryption algorithm which has several advantages in data encryption. However, AES suffer from some drawbacks such as high computations, pattern appearance if apply for image encryption, and more hardware requirements. These problems are more complicated when the AES algorithm is used for multimedia encryption. New modification to AES-128 algorithm which reduce the computations and hardware requirements are proposed by enforcement Mixcolumn transformation in five rounds instead of nine rounds as in original AES-128. Second proposed is suggest new simple S-box used for encryption and decryption. The implementation of advanced encryption standard algorithm is important requirement where many researches proposed different items to this purpose. A simply item proposed in this paper to speedy, low cost implementation of Modified Advanced Encryption Standard (MAES) cryptographic algorithm is 8085A microprocessor. The results prove that the modifications of AES m
    • سنة النشر : 2013
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : Histogram Portioning and Equalization Based Enhancement Method for Multiple Applications

    ملخص البحث :

    New method for image enhancement based on histogram division is introduced in this paper. Human eyes sense the differences in brightness of an image when two most significant bits of pixel value are changed. Proposed method suggests equalizing the histogram after its portioning into four parts. The advantages of this division are brightness preserving and avoiding over enhancement phenomena. The proposed method is non parametric and fast which makes it more compatible with HD images enhancement. Experimental results proved that the proposed method has high performance to enhance the image with preserving the original image brightness. Also enhancement time for proposed method is very short compared to different enhancement algorithms
    • سنة النشر : 2014
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : Reversible Color and Gray-scale Based Images in Image Hiding Method Using Adding and Subtracting Operations

    ملخص البحث :

    • سنة النشر : 2014
    • تصنيف البحث : other
    • تحميل

  • عنوان البحث : High Definition Image Encryption Algorithm Based on AES Modification

    ملخص البحث :

    In this article, a high-speed and highly restricted encryption algorithm is proposed to cipher high-definition (HD) images based on the modified advanced encryption standard (AES) algorithm. AES is a well-known block cipher algorithm and has several advantages, such as high-level security and implementation ability. However, AES has some drawbacks, including high computation costs, pattern appearance, and high hardware requirements. The aforementioned problems become more complex when the AES algorithm ciphers an image, especially HD images. Three modifications are proposed in this paper to improve AES algorithm performance through, decreasing the computation costs, decreasing the hardware requirements, and increasing the security level. First, modification was conducted using MixColumn transformation in 5 rounds instead of 10 rounds in the original AES-128 to decrease the encryption time. Security is enhanced by improving the key schedule operation by adding MixColumn transformation to this operation as second modification. In addition, to decrease the hardware requirements, S-box and Inv. S-box in the original AES are replaced by one simple S-box used for encryption and decryption in the proposed method. The proposed AES version conducts one of the ciphering modes to solve the appearance pattern problem. Experimental results indicate that the proposed modifications to the AES algorithm made the algorithm more compatible with HD image encryption.
    • سنة النشر : 2014
    • تصنيف البحث : clarivate
    • تحميل

  • عنوان البحث : Binary decomposition-based Image cipher algorithm with flexible method for key construction

    ملخص البحث :

    Image security is still one of the important fields in multimedia processing because it’s used in our daily lives. Watermarking, steganography, and ciphering are three directions to keep an image secret. Encryption defined as the process of changing information (which called plaintext) into an unreadable secret format (which called cipher-text). A new ciphering algorithm based on binary decomposition and binary codes conversion is proposed in this paper. The key is constructed in a flexible way based on the size of a secret image using some logical operations to increase the security levels. Three test images in different sizes were used to evaluate the performance of the proposed algorithm. The results of the visual scene and statistical factors proved that the suggested method was ciphering the image with high security. The proposed work was validated to confirm its effectiveness. As conclusions, the uses of decomposition and simple binary operations have given high-level image security. Also, key construction is an important step to face several types of attackers.
    • سنة النشر : 2022
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : Safeguard Algorithm by Conventional Security with DNA Cryptography Method

    ملخص البحث :

    Encryption defined as change information process (which called plaintext) into an unreadable secret format (which called ciphertext). This ciphertext could not be easily understood by somebody except authorized parson. Decryption is the process to converting ciphertext back into plaintext. Deoxyribonucleic Acid (DNA) based information ciphering techniques recently used in large number of encryption algorithms. DNA used as data carrier and the modern biological technology is used as implementation tool. New encryption algorithm based on DNA is proposed in this paper. The suggested approach consists of three steps (conventional, stream cipher and DNA) to get high security levels. The character was replaced by shifting depend character location in conventional step, convert to ASCII and AddRoundKey was used in stream cipher step. The result from second step converted to DNA then applying AddRoundKey with DNA key. The evaluation performance results proved that the proposed algorithm cipher the important data with high security levels.
    • سنة النشر : 2022
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : Compact dual-band RF rectifier for wireless energy harvesting using CRLH technique

    ملخص البحث :

    In this paper, a new dual-band radio frequency (RF) rectifier was designed. The proposed design is a low-profile structure with dimensions of 5×5.5 mm2 owing to the use of lumped elements rather than the conventional transmission lines which occupy large footprints. This property can be potentially exploited to use the proposed rectifier in high dense rectenna arrays to generate high output direct current (DC) voltages. Furthermore, the proposed design adopts the composite right/left-handed composite right left-handed (CRLH) technique to realize the dual-band structure at frequencies of 1.8 and 2.4 GHz. Afterward, the matching circuit was optimized to make sure that it offers good matching. The frequency response shows good matching at both bands which are about -22 and -25 dB respectively. Eventually, the simulated circuit has a conversion efficiency of 52% and output voltages of 0.5 V at -5 dBm for the two bands.
    • سنة النشر : 2021
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : Monitor human vital signs based on IoT technolgy using MQTT protocol

    ملخص البحث :

    General healthcare is essential due to the rapidly growing population and current medical costs. People living far away from cities suffer from poor medical care due to a lack of medical resources. Important to finding an active healthcare monitoring system capable of detecting deterioration of health over time in order to act quickly and taking the necessary measures on the basis of the information obtained. In case the patient has heart disease and symptoms appear for some time and disappear, the monitor standard cannot record of symptoms during a few minutes. In this case, the doctor should recommend a portable device that monitors the blood oxygen level, heart rate and body temperature which usually takes 24 to 48 hours. This paper aims to provide better healthcare for people across developing a system for detecting human vital signs such as heart rate, blood oxygen level, body temperature, temperature and humidity of the surrounding environment based on the Ubidots Internet of Things (IoT) platform. The device consists of a two-part Master and Slave. A master part is a control unit responsible for the operation of sensors remotely in real-time. Slave does collect, calculate and send data to the server using the Message Queuing Telemetry Transport (MQTT) protocol depending on the signal that sends from Master to Slave to activate the sensor required. Multiple sensors have been integrated to measure and display the vital parameters of the patient simultaneously from anywhere and at any time. All collected data displayed in a scientific manner through a program designed and installed on the smartphone or computer. This device allows medical staff to continuously monitor the patient and accurately detect changes in patient status in real-time.
    • سنة النشر : 2020
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : An Overview of Patient’s Health Status Monitoring System Based on Internet of Things (IoT)

    ملخص البحث :

    The Internet of Things (IoT) is a newly emerging term for the new generation of the Internet which allows understanding between interconnected devices. IoT acts as an assistant in healthcare and plays an extremely important role in wide scopes of medicinal services observing applications. Through determining the pattern of parameters that are observed, the character of the disease can be expected. Health specialists and technicians have developed a great system with low-cost healthcare monitoring for people suffering from many diseases using common techniques such as wearable devices, wireless channels, and other remote devices. Network-related sensors, either worn on the body or in living environments, collect rich information to assess the physical and mental state of the patient. This work focuses on scanning the existing e-health (electronic healthcare) monitoring system using integrated systems. The main goal of the e-health monitoring system is to offer the patient a prescription automatically according to his or her condition. The doctor can check patient health continuously without physical interaction. The study aims to explore the uses of IoT applications in the medical sector, and its role in raising the level of medical care services in health institutions. Also, the study will address the applications of IoT in the medical field and the extent of its use to enrich traditional methods in various health fields and to determine the extent of the ability of IoT to improve the quality of health services provided. The study relies on a descriptive research approach through an analysis of the literature published in this field. The results of the study refer to the application of IoT in the health institutions, it will help to obtain accurate diagnoses for patients, which will reflect on the quality of service provided to the patient. It will also reduce periodic patient reviews to the hospital by relying on IoT applications for remote diagnosis. Also, an application in health institutions will contribute to providing data correct for the diseases that patients suffer from, and hence employing them in preparing scientific research to obtain more accurate results. This paper introduces the review of the Internet-based healthcare monitoring system (HCMS) and the general outlines on opportunities and challenges of the patient’s Internet-based patient health monitoring system.
    • سنة النشر : 2020
    • تصنيف البحث : clarivate
    • تحميل

  • عنوان البحث : A robust watermark algorithm for copyright protection by using 5-level DWT and two logos

    ملخص البحث :

    Recent growth and development of internet and multimedia technologies have made it significant to upload data; however, in this situation, the protection of intellectual property rights has become a critical issue. Digital media, including videos, audios, and images are readily distributed, reproduced, and manipulated over these networks that will be lost copyright. Also, the development of various data manipulation tools like PDF converter and photoshop editor has resulted in digital data copyright issues. So, a digital watermarking technique has emerged as an efficient technique of protecting intellectual property rights by providing digital data copyright authentication and protection. In this technique, a watermarked document was integrated into electronic data to prevent unauthorized access. In this paper, A robust watermark algorithm based on a 5-level DWT and two log was proposed to enhance the copyright protection of images in unsecured media. Our lab results validate that our algorithm scheme is robust and forceful against several sets of attacks, and high-quality watermarked image was achieved, where the algorithm was assessed by computation of many evaluation metrics such as PSNR, SNR, MAE, and RMSE.
    • سنة النشر : 2021
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : Enhanced hybrid image security algorithms for high definition images in multiple applications

    ملخص البحث :

    Protection of multimedia information from different types of attackers has become important for people and governments. A high definition image has a large amount of data, and thus, keeping it secret is difficult. Another challenge that security algorithms must face with respect to high definition images in medical and remote sensing applications is pattern appearances, which results from existing regions with high density in the same color, such as background regions. An encryption and hiding based new hybrid image security systems are proposed in this paper for the purpose of keeping high definition images secret. First, one hiding method and two encryption methods are used in two hybrid algorithms. The new hiding algorithm proposed here starts by applying reordering and scrambling operations to the six Most Significant Bit planes of the secret image, and then, it hides them in an unknown scene cover image using adding or subtracting operations. Second, two different ciphering algorithms are used to encrypt the stego-image to obtain two different hybrid image security systems. The first encryption algorithm is based on binary code decomposition, while the second algorithm is a modification of an advanced encryption standard. After evaluating each hybrid algorithm alone, a comparison between the two hybrid systems is introduced to determine the best system. Several parameters were used for the performance, including the visual scene, histogram analysis, entropy, security analysis, and execution time.
    • سنة النشر : 2017
    • تصنيف البحث : clarivate
    • تحميل

  • عنوان البحث : Study of WiMAX Based Communication Channel Effects on the Ciphered Image Using MAES Algorithm

    ملخص البحث :

    Protection of multimedia information from different types of attackers and send it over communication channels has become important for people and governments. The form of reconstructed image from an actual transmission channel is an important challenge faces the ciphering algorithms. MAES algorithm is an important modified version of AES algorithm used to cipher an image with high security level and low computation cost. This paper presents an study of Channel effects on MAES ciphering algorithm. An encrypted image by MAES is transmitted and received over WiMAX standard then check its features. Comparison between original and reconstructed versions of secret image was done. Many parameters such as visual scene, histogram analysis, correlation coefficients and entropy were used to achieve this comparison. The results of study achieved in this work proved that the ciphered algorithm is strong against WiMAX channel problems especially when the SNR of the channel increased.
    • سنة النشر : 2018
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : An Efficient Video Steganography Method Using AES Ciphering

    ملخص البحث :

    The ability to communicate multimedia content quickly has been made possible by recent advancements in Internet speed. However, these technological advancements result in breaches of data security and personal information. Private information protection is made possible through digital steganography, which is crucial in the contemporary Internet era. Due to its high ability to conceal critical data, digital video has drawn the attention of many researchers in all digital media. Recently, a variety of video steganography techniques have been put out to stop the theft of sensitive data. However, there are numerous problems with these approaches' resilience, embedding ability, and visual imperceptibility. This work suggests a novel method for video steganography that relies on the corner location theory and the LSBs algorithm to address these problems. The suggested method initially locates areas of corner points inside the frames using the Shi-Tomasi Technique. Then, it employs the 4-LSBs technique to conceal sensitive information inside the noted corner spots. Additionally, to increase security, the suggested method encrypts sensitive data using the AES cipher method before embedding. The suggested approach is exceedingly secure and almost unnoticeable, and sufficiently robust Salt & Pepper noise, which has an average Structural Similarity Index (SSIM) of more than 0.9998, on the basis of experimental results. The results also showed that the proposed method is superior to the methods developed based on lack of visual imperceptibility, offering good peak signal-to-noise ratios (PSNR) of an average of 57.57 dB while preserving excellent embedding capacities.
    • سنة النشر : 2022
    • تصنيف البحث : scopus
    • تحميل

  • عنوان البحث : A new design and simulation of cylindrical-gold horn Nano-antenna at terahertz region for energy harvesting application

    ملخص البحث :

    In this paper, the design and simulate a new horn nanoantenna at terahertz frequencies by using the CST Microwave studio 2018. The proposed design be composed of an Au–Air–Au symmetric transmission line flared horn at the end, where the arranged of cylindrical gold pillars have been considered in the geometrical lattice. The Numerical simulation have been done in this work with taking in the consideration the losses of the material and the desperation. The horn nanoantenna shown with numerical results (wide bandwidth) and the directivity is greater than 10 dB from the results, the horn nanoantenna could be used in different applications such as energy harvesting, telecommunication and different technical ranging from smart lighting to optical wireless communication.
    • سنة النشر : 2018
    • تصنيف البحث : scopus
    • تحميل