Publications

Export 182 results:
Sort by: Author Title [ Type  (Desc)] Year
Thesis
Abdo, W., Evolutionary Computation in Cryptanalysis, , Cairo Egypt, Al Azhar University and Scientific Research Group in Egypt (SRGE), 2013. ppt_phd_thesis_on_EC_CA.pdfphd_thesis_EC_CA_2013.pdf
Bakrawy, L. M. E., A. - E. " "Hassanien, and N. I. Ghali, Machine Learning in Image Authentication, , Cairo, Al-Azhar University, 2012. Abstract

In recent years image authentication has gained substantial attraction by the research community. It promises the solution to many problems such as content piracy, illicit manipulation of medical/legal documents, content security and so on. As watermark-based image authentication approaches are efficient and attractive, some types of watermarks such as logos, labels, trademark, or random sequence representing the author’s ownership, are mbedded into the desired digital image. Generally, a registration to the authentication center is necessary, which helps to solve ownership disputes by identifying the owner of the disputed media. If necessary, the embedded watermark in the digital image can be used to verify ownership Due to the open environment of Internet downloading, copyright protection introduces a new set of challenging problems regarding security and illegal distribution of privately owned images. One solution to these problems is digital watermarking, i.e., the insertion of information into the image data in such a way that the added information is not visible and yet resistant to image alterations. A watermarking technique is to prevent digital images that belong to rightful owners from being illegally commercialized or used, and it can verify the intellectual property right. The watermark should be robust and transparent, but the ways of pursuing transparency and robustness are conflict. For instance, if we would like to concentrate on the transparency issue, it is natural to embed the smallest modulation into images whenever possible. However, due to such small values in the embedded watermark, attacks can easily destroy the problems The first proposed solution is based on the associative watermarking and vector quantization. It achieves more effective against several images processing such as blurring, sharpening adding in Gaussian noise, cropping, and JPEG lossy compression especially in case of Gaussian noise and blurring. Also this technique is implemented to hide biometric data, fingerprint image, over three different types of medical images: CT, MRI and interventional images. It also achieves an effective resistance against several images processing such as JPEG lossy compression, sharpening, blurring and adding in Gaussian noise The second contribution in this thesis is strict authentication of multimodal biometric images using an improved secure hash function (ISHA-1) and near sets. It indicates that the proposed hash function is collision resistant and assures a good compression and preimage resistance. Also it reduces the time of implementation comparing to standard secure hash function. Moreover, the difference in time between SHA-1 and ISHA-1 increases by increasing the number of letters in message since the running time of implementation of ISHA-1 is limited compared to the running time of implementation of SHA-1. Also the proposed approach guarantees the security assurance and reduces the time of implementation. The third proposed contribution is fragile watermarking approach for image authentication based on rough k-means only and hybridization of rough k-means and particle swarm optimization. It can embed watermark without causing noticeable visual artifacts, and does not only achieve superior tamper detection in images accurately, it also recovers tampered regions effectively. In addition, it shows that the proposed approach can effectively thwart different attacks, such as the cut-and paste attack and collage attack, while sustaining superior tamper detection and localization accuracy. Moreover, the running time of implemented hybrid system is limited compared to the running time of the implemented rough k-means only. Especially, when we used exponential particle swarm optimization to optimize the parameters of rough k-means.

Miscellaneous
Hassanien, A. E., K. Shaalan, T. Gaber, A. T. Azar, and F. Tolba, Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016, : Springer, 2016. Abstract
n/a
Li, T., H. S. Nguyen, G. Wang, J. W. Grzymala-Busse, R. Janicki, A. - E. Hassanien, and H. Yu, Rough Sets and Knowledge Technology: 7th International Conference, RSKT 2012, Chengdu, China, August 17-20, 2012, Proceedings, : Springer, 2012. Abstract
n/a
Li, T., H. S. Nguyen, G. Wang, J. W. Grzymala-Busse, R. Janicki, A. - E. Hassanien, and H. Yu, Rough Sets and Knowledge Technology: 7th International Conference, RSKT 2012, Chengdu, China, August 17-20, 2012, Proceedings, : Springer, 2012. Abstract
n/a
Journal Article
Tharwatd, A., T. Gaber, and A. E. Hassanien, " One-dimensional vs. two-dimensional based features: Plant identification approach, ", Journal of Applied Logic , vol. Available online 15 November 2017 , 2017. AbstractWebsite

The number of endangered species has been increased due to shifts in the agricultural production, climate change, and poor urban planning. This has led to investigating new methods to address the problem of plant species identification/classification. In this paper, a plant identification approach using 2D digital leaves images was proposed. The approach used two features extraction methods based on one-dimensional (1D) and two-dimensional (2D) and the Bagging classifier. For the 1D-based methods, Principal Component Analysis (PCA), Direct Linear Discriminant Analysis (DLDA), and PCA + LDA techniques were applied, while 2DPCA and 2DLDA algorithms were used for the 2D-based method. To classify the extracted features in both methods, the Bagging classifier, with the decision tree as a weak learner was used. The five variants, i.e. PCA, PCA + LDA, DLDA, 2DPCA, and 2DLDA, of the approach were tested using the Flavia public dataset which consists of 1907 colored leaves images. The accuracy of these variants was evaluated and the results showed that the 2DPCA and 2DLDA methods were much better than using the PCA, PCA + LDA, and DLDA. Furthermore, it was found that the 2DLDA method was the best one and the increase of the weak learners of the Bagging classifier yielded a better classification accuracy. Also, a comparison with the most related work showed that our approach achieved better accuracy under the same dataset and same experimental setup.

Moftah, H. M., A. T. Azar, E. T. Al-Shammari, N. I. Ghali, A. E. Hassanien, and M. Shoman, "Adaptive k-means clustering algorithm for MR breast image segmentation", Neural Computing and Applications, vol. 24, no. 7-8: Springer London, pp. 1917–1928, 2014. Abstract
n/a
Moftah, H. M., A. T. Azar, E. T. Al-Shammari, N. I. Ghali, A. E. Hassanien, and M. Shoman, "Adaptive k-means clustering algorithm for MR breast image segmentation", Neural Computing and Applications, vol. 24, no. 7-8: Springer London, pp. 1917–1928, 2014. Abstract
n/a
Soliman, M. M., A. E. Hassanien, N. I. Ghali, and H. M. Onsi, "An adaptive Watermarking Approach for Medical Imaging Using Swarm Intelligent", International Journal of Smart Home, (ISSN: 1975-4094), vol. 6, issue 1, pp. 37-45, 2012. AbstractIJSH_ 2012.pdfWebsite

In this paper we present a secure patient medical images and authentication scheme which enhances the security, confidentiality and integrity of medical images transmitted through the Internet. This paper proposes a watermarking by invoking particle swarm optimization (PSO) technique in adaptive quantization index modulation and singular value decomposition in conjunction with discrete wavelet transform (DWT) and discrete cosine transform (DCT). The proposed approach promotes the robustness and watermarked image quality. The experimental results show that the proposed algorithm yields a watermark which is invisible to human eyes, robust against a wide variety of common attacks and reliable enough for tracing colluders.

Soliman, M. M., A. E. Hassanien, N. I. Ghali, and H. M. Onsi, "An adaptive watermarking approach for medical imaging using swarm intelligent", International Journal of Smart Home, vol. 6, no. 1, pp. 37–50, 2012. Abstract
n/a
Soliman, M. M., A. E. Hassanien, N. I. Ghali, and H. M. Onsi, "An adaptive watermarking approach for medical imaging using swarm intelligent", International Journal of Smart Home, vol. 6, no. 1, pp. 37–50, 2012. Abstract
n/a
Gaber, T., Alaa Tharwat, A. E. Hassanien, and V. Snasel, "Biometric cattle identification approach based on Weber’s Local Descriptor and AdaBoost classifier", Computers and Electronics in Agriculture, vol. 122 , issue March 2016 , pp. 55–66, 2016. Website
Gaber, T., Alaa Tharwat, A. E. Hassanien, and V. Snasel, "Biometric cattle identification approach based on weber’s local descriptor and adaboost classifier", Computers and Electronics in Agriculture, vol. 122: Elsevier, pp. 55–66, 2016. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization", International Journal of Future Generation Communication and Networking, vol. 4, no. 4, pp. 77–88, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization", International Journal of Future Generation Communication and Networking, vol. 4, no. 4, pp. 77–88, 2011. Abstract
n/a
Hassanien, A. E., E. T. Al-Shammari, and N. I. Ghali, "Computational intelligence techniques in bioinformatics", Computational biology and chemistry, vol. 47: Elsevier, pp. 37–47, 2013. Abstract
n/a
Hassanien, A. E., E. T. Al-Shammari, and N. I. Ghali, "Computational intelligence techniques in bioinformatics", Computational biology and chemistry, vol. 47: Elsevier, pp. 37–47, 2013. Abstract
n/a
Elbedwehy, M. N., M. E. Ghoneim, A. E. Hassanien, and A. T. Azar, "A computational knowledge representation model for cognitive computers", Neural Computing and Application (Springer), vol. In press, 2014.
Elbedwehy, M. N., M. E. Ghoneim, A. E. Hassanien, and A. T. Azar, "A computational knowledge representation model for cognitive computers", Neural Computing and Application , vol. June 2014, 2014. AbstractWebsite

The accumulating data are easy to store but the ability of understanding and using it does not keep track with its growth. So researches focus on the nature of knowledge processing in the mind. This paper proposes a semantic model (CKRMCC) based on cognitive aspects that enables cognitive computer to process the knowledge as the human mind and find a suitable representation of that knowledge. In cognitive computer, knowledge processing passes through three major stages: knowledge acquisition and encoding, knowledge representation, and knowledge inference and validation. The core of CKRMCC is knowledge representation, which in turn proceeds through four phases: prototype formation phase, discrimination phase, generalization phase, and algorithm development phase. Each of those phases is mathematically formulated using the notions of real-time process algebra. The performance efficiency of CKRMCC is evaluated using some datasets from the well-known UCI repository of machine learning datasets. The acquired datasets are divided into training and testing data that are encoded using concept matrix. Consequently, in the knowledge representation stage, a set of symbolic rule is derived to establish a suitable representation for the training datasets. This representation will be available in a usable form when it is needed in the future. The inference stage uses the rule set to obtain the classes of the encoded testing datasets. Finally, knowledge validation phase is validating and verifying the results of applying the rule set on testing datasets. The performances are compared with classification and regression tree and support vector machine and prove that CKRMCC has an efficient performance in representing the knowledge using symbolic rules.

Elbedwehy, M. N., M. E. Ghoneim, A. E. Hassanien, and A. T. Azar, "A computational knowledge representation model for cognitive computers", Neural Computing and Applications, vol. 25, no. 7-8: Springer London, pp. 1517–1534, 2014. Abstract
n/a
Grosan, C., A. Abraham, and A. - E. Hassanien, "Designing resilient networks using multicriteria metaheuristics", Telecommunication Systems , vol. 40, issue 1-2, pp. 75-88, 2009. AbstractWebsite

The paper deals with the design of resilient networks that are fault tolerant against link failures. Usually,
fault tolerance is achieved by providing backup paths, which are used in case of an edge failure on a primary path. We consider this task as a multiobjective optimization problem: to provide resilience in networks while minimizing the cost subject to capacity constraint. We propose a stochastic approach,
which can generate multiple Pareto solutions in a single run. The feasibility of the proposed method is illustrated by considering several network design problems using a single weighted average of objectives and a direct multiobjective optimization approach using the Pareto dominance concept.

Ghali, N. I., R. Wahid, and A. E. Hassanien, "Heart Sounds Human Identification and Verification Approaches using Vector Quantization and Gaussian Mixture Models", International Journal of Systems Biology and Biomedical Technologies (IJSBBT), vol. 1, no. 4: IGI Global, pp. 74–87, 2012. Abstract
n/a
Ghali, N. I., R. Wahid, and A. E. Hassanien, "Heart Sounds Human Identification and Verification Approaches using Vector Quantization and Gaussian Mixture Models", International Journal of Systems Biology and Biomedical Technologies (IJSBBT), vol. 1, no. 4: IGI Global, pp. 74–87, 2012. Abstract
n/a
Tourism