Skip to main content

No-Reference Image Sharpness Assessment Based On Local Phase Coherence Measurement

Research Authors
R.Hassen,Z.Wang,M.Salama
Research Department
Research Journal
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
Research Member
Research Publisher
IEEE
Research Rank
3
Research Website
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5487364
Research Year
2010

Flexible Framework for Local Phase Coherence Computation

Research Authors
R.Hassen,Z.Wang,M.Salama
Research Department
Research Journal
International Conference of Image Analysis and Recognition (ICIAR)
Research Member
Research Pages
pp 40-49
Research Publisher
Springer Berlin Heidelberg
Research Rank
3
Research Vol
Vol. 6753
Research Website
http://www.aimiconf.org/iciar11/
Research Year
2011

Image Sharpness Assessment Based on Local Phase Coherence

Research Authors
R.Hassen,Z.Wang,M.Salama
Research Department
Research Journal
IEEE Transactions on Image Processing
Research Member
Research Pages
1057-7149
Research Publisher
IEEE
Research Rank
1
Research Vol
Volume:22 , Issue: 7
Research Website
http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=83
Research Year
2013

Objective Quality Assessment for Multi-exposure Multi-focus Image Fusion

Research Authors
R.Hassen,Z.Wang,M.Salama
Research Department
Research Journal
IEEE Transactions on Image Processing
Research Member
Research Pages
2712 - 2724
Research Publisher
IEEE
Research Rank
1
Research Vol
Volume:24 , Issue: 9
Research Website
http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=83
Research Year
2015

Detection and Removal of Gray, Black and Cooperative Black Hole Attacks in AODV Technique

Research Abstract
Mobile ad hoc network (MANET) is an autonomous self-configuring infrastructure-less wireless network. MANET is vulnerable to a lot of routing security threats due to unreliability of its nodes that are highly involved in the routing process. In this paper, a new technique is proposed to enhance the security of one of the most popular MANET routing protocols that is called Ad hoc on Demand Distance Vector (AODV) with minimum routing overhead and high packet delivery ratio. The proposed technique intends to detect and remove black, gray, and cooperative black hole AODV attacks depending on a mobile backbone network constructed from randomly moving regular MANET nodes based on their trust value, location, and power. The backbone network monitors regular nodes as well as each other to periodically estimate monitoring trust values which represent the reliability of each node in the network. The drop in the monitoring trust value of any node is used as a clue to its malicious behavior. The backbone network also tries to bait the malicious nodes to reply to a request for a route to fake destination address. The proposed technique uses the control packets of the AODV to exchange its control information which highly reduces the overhead. The simulation results show that the performance of the proposed technique is more secure than AODV and the other recently introduced techniques.
Research Authors
Hosny M. Ibrahim, Nagwa M. Omar, Ebram K. William
Research Department
Research Journal
International Journal of Advanced Computer Science and Applications (IJACSA)
Research Member
Research Pages
pp. 60-70
Research Publisher
The Science and Information Organization
Research Rank
1
Research Vol
Vol 6- No. 5
Research Website
http://thesai.org/Publications/ViewPaper?Volume=6&Issue=5&Code=ijacsa&SerialNo=11
Research Year
2015

A Secure Technique for Construction and Maintenance of a Trusted Mobile Backbone Network in MANET

Research Abstract
Mobile ad hoc network (MANET) has a distributed and uncontrolled nature in which all nodes are considered trusted and contribute in the route discovery process. Accordingly, MANET is vulnerable to many types of routing attacks. One of the most popular MANET routing protocol that is vulnerable to different attacks is ad hoc on demand distance vector (AODV) routing protocol. In this paper, a mobile backbone network of trusted nodes is proposed to enhance AODV security with minimum overhead. The proposed backbone network does not violate the MANET mobility characteristic. It is constructed from randomly moving regular MANET nodes based on their trust value, location, and power. The backbone network monitors regular nodes as well as each other to periodically estimate monitoring trust values which represent the reliability of each node in the network. The simulation results show that the backbone network is trustable, has dynamic behavior, and has good coverage.
Research Authors
Hosny M. Ibrahim, Nagwa M. Omar, Ebram K. William
Research Department
Research Journal
The 12th IEEE International Conference on Networking, Sensing and Control, ICNSC15
Research Pages
116 - 121
Research Publisher
IEEE
Research Rank
3
Research Vol
NULL
Research Website
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=7116020&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7116020
Research Year
2015

Video Face Replacement System Using a Modified Poisson Blending Technique

Research Abstract
In this paper, we present a system for video face replacement that requires only two videos of a source actor and a target actor using only a single digital camera. Existing video face replacement techniques usually need special equipment or 3D models; the proposed system achieves a realistic replacement of faces without using 3D models or special equipment. There are many applications of the proposed system that are presented in this paper using only two footages of actors. We can replace a frontal face with another one; this gives the possibility to change the appearance of actors without makeup or any prior settings. We introduce a new technique for face blending that is based on a gradient domain method called Modified Poisson Blending (MPB) to reduce the bleeding problem of Poisson image editing, and achieve realistic results of face replacement. Experimental results demonstrate that the proposed system using MPB technique produces more realistic results than the results of other cloning techniques.
Research Authors
Mahmoud Afifi
Khaled F. Hussain
Hosny M. Ibrahim
Nagwa M. Omar
Research Department
Research Journal
Intelligent Signal Processing and Communication Systems (ISPACS), 2014 International Symposium on
Research Pages
pp. 205-210
Research Publisher
IEEE
Research Rank
3
Research Vol
Vol. 1
Research Year
2014

Fast Video Completion Using Patch-based Synthesis and Image Registration

Research Abstract
Video completion has many applications in movie post-production, such as removing unwanted objects, artifacts, or logos. Most state-of-the-art video completion techniques are time-consuming in order to ensure spatial-temporal coherence. This paper presents a Fast Video Completion (FVC) technique that is based on patch-based synthesis and image registration. FVC generates key frames without the unwanted objects over the input video using a patch-based synthesis. The rest of the video completion process requires a low computing time using the registered prior frame. The results of the proposed technique show that FVC preserves the spatial-temporal coherence in an acceptable time, that makes the proposed technique is applicable for long videos.
Research Authors
Mahmoud Afifi
Khaled F. Hussain
Hosny M. Ibrahim
Nagwa M. Omar
Research Department
Research Journal
Intelligent Signal Processing and Communication Systems (ISPACS), 2014 International Symposium on
Research Member
Research Pages
pp. 200-204
Research Publisher
IEEE
Research Rank
3
Research Vol
Vol. 1
Research Year
2014

Utilizing Genetic Algorithm in a Sink Driven, Energy Aware Routing Protocol for Wireless Sensor Networks

Research Authors
Hosny M. Ibrahim, Nagwa M. Omar, Ali H. Ahmed
Research Department
Research Journal
Advances in Computer Science, Engineering & Applications ,Proceedings of the Second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012)
Research Member
Research Pages
pp. 447-456
Research Publisher
Springer
Research Rank
3
Research Vol
vol. 167
Research Year
2012
Subscribe to