Entity

Time filter

Source Type


Hosam O.,The City for Scientific Research and Technology Applications | Alraddadi A.S.,Taibah University
Journal of Next Generation Information Technology | Year: 2013

Image watermarking is the technology of hiding data into digital media for intellectual property protection. We proposed robust technique for watermarking digital images namely Adjacent Pixel Position Switch (APPS). The idea of APPS is to slightly change the position of the pixel without affecting the overall shape of the image. If we draw line by computer and changed slightly the position of one pixel of the line, the overall shape of the line will not be affected; the change will not be noticed by Human Visual System. In APPS the image is divided into 2×2 non-overlapping blocks, one bit is embedded in each block. Embedding is done by switching the position of pair of pixels in each block. APPS is our novel idea, not previously explored. APPS watermarking results showed that the watermark can be embedded without affecting the quality of the image, the algorithm is efficiently used in document forgery detection, and in addition the proposed approach is robust to almost all attacks. Source


Hosam O.,The City for Scientific Research and Technology Applications
Open Signal Processing Journal | Year: 2013

Digital communication and media sharing have extensively increased in the last couple of years. Research is focused on protecting digital media through copyright protection. The digital media is secured by watermarking. We have developed an image watermarking technique in the frequency domain to hide secure information in the Discrete Cosine Transform (DCT) coefficients of the carrier image. DCT coefficients are modulated by Dither Modulation (DM). We have increased the modulation step to be able to entirely recover the embedded data (watermark) and increase the robustness of our proposed algorithm to affine transforms and geometrical attacks. Our algorithm showed lower complexity and robustness against different attacks. © Osama Hosam; Licensee Bentham Open. Source


Hosam O.,Taibah University | Hosam O.,The City for Scientific Research and Technology Applications | Halima N.B.,Taibah University | Dakroury S.,Taibah University | And 2 more authors.
Journal of Theoretical and Applied Information Technology | Year: 2015

In this paper, the scene parameters are setup for scene reconstruction; camera position and orientation are considered. Consecutive images are used to create the depth map of the scene. After reconstructing the scene, we apply a new methodology to augment the scene by using LAB color space and K-means clustering. A general scheme for scene manipulation is also introduced. The new methodology has shown high accuracy in scene reconstruction and augmentation. © 2005 - 2015 JATIT & LLS. All rights reserved. Source


Hosam O.,The City for Scientific Research and Technology Applications | Halima N.B.,Taibah University
Journal of Theoretical and Applied Information Technology | Year: 2015

Digital image watermarking is mainly used in copyright protection. We propose block based approach for watermarking images with their own ROI. The algorithm divides the image into 8x8 blocks. DWT transform is applied on each block. The extracted LL of the computed DWT is obtained and DCT is applied on LL to obtain LL-DCT coefficients. The watermark is embedded by changing the sign of LL-DCT coefficients of each block. In this paper we study the block perturbation properties, we found that the block embedding index is inversely proportional to watermark robustness; in addition we found that single 8x8 block can optimally hold single bit by changing the sign of the medium LL-DCT coefficient. © 2005 - 2015 JATIT & LLS. All rights reserved. Source


Halima N.B.,The City for Scientific Research and Technology Applications | Hosam O.,Taibah University
International Journal of Security and its Applications | Year: 2016

Terror attacks are increased worldwide. The early detection of weapons is an important objective for security specialists. In this paper, we proposed an automated surveillance system for detecting fire weapons in cluttered scene. First SIFT features are extracted from the collection of images. Second, K-means clustering is adopted for clustering the SIFT features. Third, a word vocabulary based histogram is implemented by counting occurrences of the extracted clusters in each image. The histogram is the input to Support Vector Machine that will be trained on the collection of images. Finally, the trained SVM is the system classifier that will decide if new image contains a weapon or not. The main contributions of the paper is to adopt the visual words classification scheme in detecting fire weapons. In addition, we used RANSAC to reduce the matching outliers. The system showed high accuracy in detecting fire weapons in images and video surveillance systems. © 2016 SERSC. Source

Discover hidden collaborations