- Khaled A. Ramadan
- EL-Sayed M. El-Rabaie
- Mohmed Abd EL-Nabi
- Emad S. Hassan
- Xu Zhu
- Ayman E. A. Abdelaal
- Moawad I. Dessouky
- Rania A. Ghazy
- El-Sayed M. El-Rabaie
- Nawal A. El-Feshawy
- Emad. A. Elaty
- Abd-Elnaby Mohammed
- Sami A. El-Doli
- Heba M. El-Hoseny
- Hossam E. H. Ahmed
- Hassan B. Kazemian
- Abdelrahman Selim
- Mohiy M. Hadhoud
- Zeinab F. Elsharkawy
- Safey A. Abdelwahab
- Sayed M. Elaraby
- Mohammed Y. Abbass
- Salah M. Diab
- Bassiony M. Salam
- Said S. Haggag
- Amany F. Eldaoshy
- Al-Dalil Sami
- Samir Abd Elghafar
- Salaheldin M. Diab
- Bassiouny M. Sallam
- S. El-Rabaie
- Bidaa Mortada
- Mohamad F. El-Kordy
- Osama Zahran
- Safaa Elgazar
- El-Dolil Sami
- Alaa M. Abbas
- Eman A.Elshehaly
- Ibrahim M. Eldokany
- Sami A. El-Dolil
- Noha Ramadan
- HossamEldin H. Ahmed
- Said E. Elkhamy
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Abd El-Samie, Fathi E.
- Continuous Phase Modulation for Digital Video Broadcasting and a Chaotic Interleaving with Another OFDM Version
Authors
1 Department of Electronics and Electrical Communications Engineering, Menoufia University, 32952, Menouf, EG
2 Department of Electronics and Electrical Communications Engineering, Menoufia University, 32952, Menouf, EG
3 Department of Electrical Engineering and Electronics, The University of Liverpool, L69 3GJ, GB
Source
Programmable Device Circuits and Systems, Vol 6, No 8 (2014), Pagination: 223-232Abstract
This paper presents the personification of the Digital Video Broadcasting Terrestrial (DVB-T) system with signal transformation (CPM-OFDM). The suggested formation collect the feature of palliating the Peak-to-Average Power Ratio (PAPR) trouble in the Power Amplifier (PA) in extension take usefulness of the channel frequency diversity and power efficiency of CPM. Simulation outcome presenting that the execution of the CPM-DVB-T system with multi-path fading is bestead than its performance with single-path fading. and we suggest a chaotic interleaving scheme for Digital Video Broadcasting with Different OFDM Version. The proposed structure combines the advantages of both a reduction of PAPR problem in power amplifier and excellent spectral energy compaction property of DCT-OFDM. The proposed chaotic interleaver DCT-OFDM-DVB-T systems are implemented with FDE to avoid the intricacy of the equalization using the minimum mean square error (MMSE) equalizer as a type of frequency domain equalizers.Keywords
DVB-T, DCT, CPM, Interleaving PAPR, MMSE Equalizer, ZF Equalizer.- A Diffserv-Aware Multi-Protocol Label Switching Traffic Engineering Applied on Virtual Private Networks
Authors
1 Menoufia University, EG
2 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG
Source
Networking and Communication Engineering, Vol 6, No 7 (2014), Pagination: 279-285Abstract
The demand on high bandwidth internet connections and applications is growing very fast due to the variety of internet arising usage either on business or entertainment. The Internet Service Providers (ISPs) have to enhance their internal networks in terms of bandwidth utilization and resources management. Two different technologies have been provided to help in solving the bandwidth utilization issues inside the ISPs networks, the diffserv Quality of Service (diffserv-QoS) and the Multi-Protocol Label Switching-Traffic Engineering (MPLS-TE). In this paper, the two technologies are used in conjunction with each other to get the highest performance, the best resources management and the efficient bandwidth utilization.Keywords
MPLS-TE, Diffserv-QoS, VPN.- Statistical Behavior of Packet Counts for Network Intrusion Detection
Authors
1 Department of Electronics and Communications, Menoufia University, Menouf, EG
2 Department of Electronics and Communications, Menoufia University, Menouf-32952, EG
3 Department of Electronics and Communications, Menoufia University, Menouf-32952, EG
Source
Networking and Communication Engineering, Vol 6, No 6 (2014), Pagination: 249-252Abstract
Intrusions and attacks have become a very serious problem in network world. This paper presents a statistical characterization of packet counts that can be used for network intrusion detection. The main idea is based on detecting any suspicious behavior in computer networks depending on the comparison between the correlation results of control and data planes in the presence and absence of attacks using histogram analysis. Signal processing tools such as median filtering, moving average filtering, and local variance estimators are exploited to help in developing network anomaly detection approaches. Therefore, detecting dissimilarity can indicate an abnormal behavior.Keywords
Anomaly Detection, Statistics, Network Intrusion Detection Systems (NIDS).- On the Estimation of Attacks in Computer Networks with an AR Approach
Authors
1 Menoufia University, Menouf, EG
2 Department of Electronics and Communications, Menoufia University, Menouf-32952, EG
Source
Networking and Communication Engineering, Vol 6, No 1 (2014), Pagination: 12-15Abstract
This Paper proposes a network based intrusion detection approach using anomaly detection in the presence of Denial of Service attacks (DoS). Flood based attacks are a common class of DoS attacks. DoS detection mechanisms that aim at detecting floods mainly look for sudden changes in the traffic and mark them anomalous. In this approach, network traffic is decomposed into control and data planes to study the relationship between them. As the data traffic generation is based on control traffic, the behavior of the two planes is expected to be similar during normal behavior. Therefore, detecting dissimilarity between the traffic of the two planes can indicate an abnormal behavior. Toward that objective, an Auto Regressive (AR) model has been used. Simulation results show that both the accuracy of the detection and less false positives.Keywords
Auto Regressive (AR), Denial-of-Service (DoS), Network Intrusion Detection Systems (NIDS).- Analytical Study for Helicopter-Satellite Communications Systems
Authors
1 Department of Electronics and Electrical Communications, Higher Institute of Engineering, El Shorouk Academy, El Shorouk City, EG
2 Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, EG
3 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG
Source
Networking and Communication Engineering, Vol 5, No 12 (2013), Pagination: 510-515Abstract
In the helicopter-Satellite Communication (H-SATCOM) the periodic blockage of the received signal due to rotor blades and carrier frequency fluctuation due to Doppler shift are two dominant impairments. This paper investigates the performance of a Helicopter–Satellite communications system from an analytical view point under conditions such as the periodic blockage due to rotor blades, time diversity transmission technique, and Viterbi decoding technique. Bit Error Probability is considered as the performance metric. The deduced mathematical expressions for periodic blockage, time diversity transmission technique, and Viterbi decoding are matched well with those resulting from simulations. Hence our analysis can be considered as a theoretical platform for further modification, development, and guidance for originating application. Also it gives precision, direction for problem solution, and system control.
Keywords
Helicopter-Satellite Communication (H-SATCOM), Bit Error Rate (BER).- Image Encryption Using Development of 1D Chaotic Maps
Authors
1 Department of Electronics and Electrical Communications, Menoufia University, EG
2 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG
3 London Metropolitain University, London, GB
Source
Digital Image Processing, Vol 6, No 3 (2014), Pagination: 118-126Abstract
In this paper an efficient approach for image encryption is presented based on feedback stream cipher using a developed chaotic maps. It consists of two modules; first the encryption module which encrypts the plain image pixel-by-pixel by using external secret key 256-bit, taking into consideration the previous values of the encrypted pixels obtained in each iteration. The second module is decryption module which decrypts the cipher image pixel by pixel to retrieve the plain image using the same key which is used in encryption. Decryption module is typical to the encryption module except the pad (session key) in this case is unmerged. The proposed algorithm can be performed using many logistic maps. We here use 1D maps such as Bernoulli map, Logistic map, and other three developed maps. The proposed algorithm using developed Bernoulli map has achieved the best results among all other maps used in the proposed algorithm. It has many useful advantages as the range of the variable r is increased, and the feedback property. Several encryption metrics is applied to judge the proposed algorithm such as statistical analysis, differential analysis, and key sensitivity tests. The proposed algorithm is compared with RC6 algorithm. Experiments and results verify and prove that the proposed algorithm using the developed Bernoulli map is highly secure from the cryptographic viewpoint, more immune to noise, has higher entropy, and has higher sensitivity. The results of security analysis show that the proposed algorithm is secure and efficient in real-time image applications.
Keywords
Cryptography, Chaos, Image Cryptosystem, Stream Cipher, Logistic Map, Bernoulli Map, Security Analysis.- Spiral Fractal Image Compression
Authors
1 Menoufia University, Menouf, EG
2 Menoufia University, EG
Source
Digital Image Processing, Vol 5, No 12 (2013), Pagination: 515-520Abstract
In this paper, we study the affect of using the spiral architecture instead of the square block decomposition in fractal compression. Comparisons with other systems like the conventional square and the simplified fractal compression systems are presented. A comparison with standard JPEG system is also introduced. We apply these types of fractal compression on a video sequence. We have found that in the case of using the spiral architecture in fractal compression, the produced or decoded image or video has a better visual quality than that produced with the conventional square system and the previously presented simplified system. We found also that all types of fractal compression are better than the JPEG standard.
Keywords
Image Compression, Fractal, Decomposition, Spiral.- Identifying Unique Flatbed Scanner Characteristics for Matching a Scanned Image to its Source
Authors
1 Engineering Department, Nuclear Research Center, Atomic Energy Authority, Cairo, EG
2 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG
3 Engineering Department, Nuclear Research Center, Atomic Energy Authority, Cairo, IN
Source
Digital Image Processing, Vol 5, No 9 (2013), Pagination: 397-403Abstract
Scanner identification is the ability to discern the devices by which an image was scanned. In this paper, a new and robustness individual source scanner identification scheme is proposed. This scheme formulates a unique fingerprint for each scanner using traces of dust, dirt, scratches, and source imperfection pattern over scanner platen on scanned images. A single Support Vector machine (SVM) classifier is implemented and trained using correlation features of scanned images to classify different scanners brands and different models for the same scanner brand, and a 99.79% detection accuracy is obtained. In addition, the robustness of the used individual source scanner identification scheme on resized different resolutions is experimentally tested. The aging effect is also experimentally tested by re-applying the proposed algorithm on the scanned images after a continuous usage of the scanners under test for certain long periods. The experimental results using the proposed classifier for different scanner brands and different models for the same scanner brand approved the validity, efficiency, and robustness of the proposed scheme to match the scanned image to its unique source.Keywords
Image Classification, Digital Image Forensics, Support Vector Machine.- Blind Source Separation with Wavelet Based ICA Technique Using Kurtosis
Authors
1 Engineering Department, Nuclear Research Center, Atomic Energy Authority, EG
2 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG
3 Nuclear Research Center, Atomic Energy Authority, EG
Source
Digital Image Processing, Vol 5, No 9 (2013), Pagination: 417-421Abstract
This paper deals with the problem of blind separation of digital images from mixtures. A method to solve this problem is blind source separation (BSS) using independent component analysis (ICA). It proposes a wavelet based ICA method using Kurtosis for blind image source separation. In this method, the observations are transformed into an adequate representation using wavelet packets decomposition and Kurtosis criterion. The simulation results of performance measures show a considerable improvement when compared to FastICA. The Peak Signal-to-Noise Ratio (PSNR), Signal-to-Noise Ratio (SNR), Root Mean Square Error (RMSE) and and Segmental Signal-to-Noise Ratio (SNRseg) are used to evaluate the quality of the separated images.Keywords
Blind Source Separation (BSS), ICA, Kurtosis.- Block-By-Block SVD Image Watermarking with Variable Block Sizes
Authors
1 Department of Electronics and Electrical Communications, Menoufia University, Menouf-32952, EG
2 Department of Electronics and Electrical Communications, Menoufia University, Menouf 32952, EG
3 Department of Electronics and Electrical Communications, Menoufia University, Menouf 32952, EG
Source
Digital Image Processing, Vol 5, No 12 (2013), Pagination: 564-572Abstract
This paper presents a block-by-block SVD watermarking algorithm with variable block sizes. The paper makes a comparison between the traditional method of Liu and the proposed method. In the proposed approach, the original image is divided into blocks, and then the watermark is embedded in the singular values (SVs) of each block, separately. This segmentation and watermarking on a block-by-block basis makes the watermark more robust to the attacks such as noise, compression, cropping and other attacks as the results reveal. Watermark detection is implemented by extracting the watermark from the SVs of the watermarked blocks. Extracting the watermark from one block at least is enough to ensure the existence of the watermark. Experimental results show that the proposed method with different block sizes is superior to the traditional method of Liu for embedding unencrypted watermarks.
Keywords
Image Processing, Cryptography, Watermarking, Singular Value Decomposition.- Wavelet Transform for Performance Enhancement of Discrete Multi-Tone Systems
Authors
1 Jazan University, SA
2 Helwan University, Cairo, EG
3 Menoufia University, Menou, EG
4 Menoufia University, EG
5 Dept. Electronics and Electrical Communications, Menoufia University, EG
6 Menoufia University, Menouf, EG
Source
Digital Signal Processing, Vol 5, No 12 (2013), Pagination: 393-403Abstract
This paper presents a new implementation of Discrete Multi-Tone (DMT) systems based on the Discrete Wavelet Transform (DWT) and time-domain equalization to maximize the bit rate. The objective of the proposed DWT-DMT system is to make use of the sub-band decomposition property of the DWT to reduce the channel effects on the transmitted signals. The mathematical model of the Time-domain Equalizer (TEQ) utilized in this paper is presented. This equalizer is tested in the Fast Fourier Transform Discrete Multi-Tone (FFT-DMT) system, and in the proposed DWT-DMT system for comparison. Simulation experiments shows that the performance of the proposed DWT-DMT system with the TEQ filter bank is better than that of the FFT-DMT system with the TEQ filter bank over the eight standard Carrier Serving Area (CSA) loops. The results show that employing the TEQ filter bank in the proposed DWT-DMT system can achieve high bit rates ranging from 2.899 Mbps to 5.369 Mbps.
Keywords
DMT System, DWT, FFT, TEQ.- Mathematical Modeling of Intrinsic Raman Spectroscopy for Biological Applications
Authors
1 Al-Menofia University, EG
2 Menoufia University, EG
3 Menoufia University, Menouf, EG
Source
Digital Signal Processing, Vol 5, No 12 (2013), Pagination: 404-411Abstract
Intrinsic Raman spectroscopy (IRS) is a technique to correct turbidity-induced Raman spectral distortions, resulting in the intrinsic Raman spectrum that would be observed in the absence of scattering and absorption. In this paper, we develop a closed form expression relating the observed and intrinsic Raman spectra through diffuse reflectance using a numerical technique. Also, we study the dependence of this expression on sample size and elastic scattering anisotropy. We compare the behavior at various turbidities, at various collection spot radii, for different sample sizes and for various values of elastic scattering anisotropy () to get best fitting with minimum error and to have an accurate relation between observed and intrinsic Raman spectra.
Keywords
Diffuse Reflectance (Rd), Observed Raman Spectrum (RamOBS), Elastic Scattering Anisotropy(g) and Intrinsic Raman Spectrum(Ramint).- Efficient Watermarking of Audio Signals
Authors
1 Menoufia University, Menouf, EG
2 Electronic Engineering, Menoufia University, Menouf, EG
Source
Digital Signal Processing, Vol 5, No 12 (2013), Pagination: 412-417Abstract
This paper presents a comparative study between the watermark encryption algorithms that are applied for audio signals. The chaotic Baker map and DES with its four modes are used as watermark encryption algorithms. Encrypted watermark is embedded in audio signal using both SVD and block based SVD methods. Experimental results show that the OFB mode is the least sensitive to attacks compared with the chaotic Baker map.
Keywords
SVD, OFB, Signal-to-Noise Ratio.- A Hybrid Approach for Speech Enhancement
Authors
1 Menoufia University, Menouf, EG
Source
Digital Signal Processing, Vol 6, No 2 (2014), Pagination:Abstract
This paper presents a speech enhancement approach using Wiener filter and wavelet transform techniques, optimized to deal with real-world noisy speech. The developed hybrid approach is tested for performance evaluation in terms of improvement in estimated Signal-to-Noise Ratio (SNR) and other objective quality measures for enhanced speech.Keywords
Wavelet Transform, SNR, DWT.- Ciphering and Coding Combined Technique for Secure Image Transmission over Wireless Channel
Authors
1 Menofia University, Menouf, 32952, EG
2 Department of Electrical Engineering, Alexandria University, EG
Source
Biometrics and Bioinformatics, Vol 6, No 2 (2014), Pagination:Abstract
Nowadays, the security of image transmission over wireless channels have been of major interest for several researchers. However , most of the image encryption schemes do not consider the effect of bit errors occurring during wireless transmission. These errors are due to the transmission factors that affect the information such as noise and multipath fading. These factors are considered as a problem that should be handled by an efficient coding scheme. In this paper, low-density parity-check (LDPC) coding technique is used with the Data Encryption Standard (DES) algorithm for efficient image communication. The DES in Cipher-Block Chaining (CBC) mode is utilized to improve data security. Furthermore, LDPC coding is utilized for error correction in order to solve the limitations of wireless channels. Simulation results show this combination of DES encryption with LDPC coding improves the reliability of the wireless channel.