Ahmed Al-ani - Academia.edu (original) (raw)

Papers by Ahmed Al-ani

Research paper thumbnail of Effect of feature and channel selection on EEG classification

Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual Conference, 2006

In this paper, we evaluate the significance of feature and channel selection on EEG classificatio... more In this paper, we evaluate the significance of feature and channel selection on EEG classification. The selection process is performed by searching the feature/channel space using genetic algorithm, and evaluating the importance of subsets using a linear support vector machine classifier. Three approaches have been considered: (i) selecting a subset of features that will be used to represent a specified set of channels, (ii) selecting channels that are each represented by a specified set of features, and (iii) selecting individual features from different channels. When applied to a brain-computer interface (BCI) problem, results indicate that improvement in classification accuracy can be achieved by considering the correct combination of channels and features.

Research paper thumbnail of A New Mutual Information Based Measure for Feature

... Ahmed Al-Ani, Mohamed Deriche and Jalel Chebil Signal Processing Research Centre, Queensland ... more ... Ahmed Al-Ani, Mohamed Deriche and Jalel Chebil Signal Processing Research Centre, Queensland University of Technology, GPO Box 2434 ... Fano [7] has shown that maximizing theMI between transformed data and the desired target achieves the lowest probability of error. ...

Research paper thumbnail of An improved pattern classification system using optimal feature selection, classifier combination, and subspace mapping techniques

Research paper thumbnail of A new algorithm for multi-channel EEG signal analysis using mutual information

... Ahmed AI-Ani and Mohamed Deriche ... III - 2961 Page 2. be considered uncorrelated with x, an... more ... Ahmed AI-Ani and Mohamed Deriche ... III - 2961 Page 2. be considered uncorrelated with x, and W is transfonnation ma trix of size (M x N). Using basic concepts of infonnation theory, and assuming that both input and noise obey Gaussian distribu tions, the MI becomes: ...

Research paper thumbnail of Multi-Channel Subspace Mapping Using an Information Maximization Criterion

Research paper thumbnail of An edge fusion approach based on the concept of multiple detector behavior

... Ahmed Al-Ani Mohammed Bennamoun Faculty of Engineering School of Computer Science University ... more ... Ahmed Al-Ani Mohammed Bennamoun Faculty of Engineering School of Computer Science University of Technology Sydney The University of Westem Australia PO Box 123, Broadway 35 Stirling Highway, Crawley NSW 2007, Australia WA 6009, Australia ahmed@eng.uts.edu ...

Research paper thumbnail of Effect of local measure on performance of the ant feature selection algorithm

... Feature Selection Algorithm Ahmed AI-Ani Faculty of Engineering University of Technology, Syd... more ... Feature Selection Algorithm Ahmed AI-Ani Faculty of Engineering University of Technology, Sydney Broadway, NSW 2007, Australia ahmed@eng.uts.edu.au Abstract-The ant feature selection algorithm has recently been proposed as a new method for feature subset selection. ...

Research paper thumbnail of Swarm intelligence in myoelectric control: particle swarm based dimensionality reduction

Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search:... more Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search: The ACM Digital Library The Guide. ...

Research paper thumbnail of Swarmed Discriminant Analysis for Multifunction Prosthesis Control

Research paper thumbnail of An enhanced Neural Network Ensemble for automatic sleep scoring

... Systems Faculty of Engineering and Information Technology University of Technology Sydney, Au... more ... Systems Faculty of Engineering and Information Technology University of Technology Sydney, Australia Email: alsukker@eng.uts.edu.au ... Systems Faculty of Engineering and Information Technology University of Technology Sydney, Australia Email: ahmed@eng.uts.edu.au ...

Research paper thumbnail of Detection of alertness states using electroencephalogram and cortical auditory evoked potential responses

Research paper thumbnail of A Review of Literature of Initial Trust in E-Services: The Case of Internet Banking Services in Jordanian Context

Research paper thumbnail of Conceptualizing Initial Trust in Internet Banking Services: A Pilot Study

Research paper thumbnail of An efficient steganography method for hiding patient confidential information

This paper deals with the important issue of security and confidentiality of patient information ... more This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

Research paper thumbnail of A novel tamper detection-recovery and watermarking system for medical image authentication and EPR hiding

Recently, the literature has witnessed an increasing interest in the study of medical image water... more Recently, the literature has witnessed an increasing interest in the study of medical image watermarking and recovery techniques. In this article, a novel image tamper localization and recovery technique for medical image authentication is proposed. The sparse coding of the Electronic Patient Record (EPR) and the reshaped region of Interest (ROI) is embedded in the transform domain of the Region of Non-Interest (RONI). The first part of the sparse coded watermark is use for saving the patient information along with the image, whereas the second part is used for authentication purpose. When the watermarked image is tampered during transmission between hospitals and medical clinics, the embedded sparse coded ROI can be extracted to recover the tampered image. The experimental results demonstrate the efficiency of the proposed technique in term of tamper correction capability, robustness to attacks, and imperceptibility.

Research paper thumbnail of An Efficient Hybrid Steganography Method Based on Edge Adaptive and Tree Based Parity Check

ABSTRACT A major requirement for any steganography method is to minimize the changes that are int... more ABSTRACT A major requirement for any steganography method is to minimize the changes that are introduced to the cover image by the data embedding process. Since the Human Visual System (HVS) is less sensitive to changes in sharp regions compared to smooth regions, edge adaptive has been proposed to discover edge regions and enhance the quality of the stego image as well as improve the embedding capacity. However, edge adaptive does not apply any coding scheme, and hence it embedding efficiency may not be optimal. In this paper, we propose a method that enhances edge adaptive by incorporating the Tree-Based Parity Check (TBPC) algorithm, which is a well-established coding-based steganography method. This combination enables not only the identification of potential pixels for embedding, but it also enhances the embedding efficiency through an efficient coding mechanism. More specifically, the method identifies the embedding locations according to the difference value between every two adjacent pixels, that form a block, in the cover image, and the number of embedding bits in each block is determined based on the difference between its two pixels. The incorporation of TBPC minimizes the modifications of the cover image, as it changes no more than two bits out of seven pixel bits when embedding four secret bits. Experimental results show that the proposed scheme can achieve both large embedding payload and high embedding efficiency.

Research paper thumbnail of A highly secure oblivious sparse coding-based watermarking system for ownership verification

ABSTRACT In the last few decades, the watermarking security issue has become one of the main chal... more ABSTRACT In the last few decades, the watermarking security issue has become one of the main challenges facing the design of watermarking techniques. In this paper, a secure oblivious watermarking system, based on Sparse Coding (SC) is proposed in order to tackle the three most critical watermarking security problems, i.e., unauthorized reading, false positive detection, and multiple claims of ownership problems, as well as optimize the fidelity, imperceptibility, and robustness characteristics. The reason for incorporating SC in the proposed system is to encode the watermark image before embedding it in the host image. This process is implemented using the well-known Stagewise Orthogonal Matching Pursuit (StOMP) method and an orthogonal dictionary that is derived from the host image itself. The watermark embedding is implemented in the transform domain of the Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) of the host image. The proposed system is oblivious, as it does not need the original host image when extracting the embedded watermark. In addition, it is suitable for both bi-level and gray-level watermarks, and can accommodate large watermarks that are up to half the size of the host image. The proposed SC–DWT–SVD based watermarking scheme is tested for various malicious and un-malicious attacks and the experimental results show that it realizes the security requirement as it tackles the false positive detection and multiple claims of ownership problems on one hand and generates an encryption form of the watermark on the other hand. In addition, the added security does not compromise the imperceptibility and robustness aspects of the proposed technique and hence can be considered to be comparable or superior to other up-to-date watermarking techniques.

Research paper thumbnail of Fuzzy Logic-Based Automatic Alertness State Classification Using Multi-channel EEG Data

Research paper thumbnail of Factors Influencing Customer's Initial Trust of Internet Banking Services in the Jordanian Context

Research paper thumbnail of A New Image-Processing-Based Technique for Measuring Leaf Dimensions

Research paper thumbnail of Effect of feature and channel selection on EEG classification

Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual Conference, 2006

In this paper, we evaluate the significance of feature and channel selection on EEG classificatio... more In this paper, we evaluate the significance of feature and channel selection on EEG classification. The selection process is performed by searching the feature/channel space using genetic algorithm, and evaluating the importance of subsets using a linear support vector machine classifier. Three approaches have been considered: (i) selecting a subset of features that will be used to represent a specified set of channels, (ii) selecting channels that are each represented by a specified set of features, and (iii) selecting individual features from different channels. When applied to a brain-computer interface (BCI) problem, results indicate that improvement in classification accuracy can be achieved by considering the correct combination of channels and features.

Research paper thumbnail of A New Mutual Information Based Measure for Feature

... Ahmed Al-Ani, Mohamed Deriche and Jalel Chebil Signal Processing Research Centre, Queensland ... more ... Ahmed Al-Ani, Mohamed Deriche and Jalel Chebil Signal Processing Research Centre, Queensland University of Technology, GPO Box 2434 ... Fano [7] has shown that maximizing theMI between transformed data and the desired target achieves the lowest probability of error. ...

Research paper thumbnail of An improved pattern classification system using optimal feature selection, classifier combination, and subspace mapping techniques

Research paper thumbnail of A new algorithm for multi-channel EEG signal analysis using mutual information

... Ahmed AI-Ani and Mohamed Deriche ... III - 2961 Page 2. be considered uncorrelated with x, an... more ... Ahmed AI-Ani and Mohamed Deriche ... III - 2961 Page 2. be considered uncorrelated with x, and W is transfonnation ma trix of size (M x N). Using basic concepts of infonnation theory, and assuming that both input and noise obey Gaussian distribu tions, the MI becomes: ...

Research paper thumbnail of Multi-Channel Subspace Mapping Using an Information Maximization Criterion

Research paper thumbnail of An edge fusion approach based on the concept of multiple detector behavior

... Ahmed Al-Ani Mohammed Bennamoun Faculty of Engineering School of Computer Science University ... more ... Ahmed Al-Ani Mohammed Bennamoun Faculty of Engineering School of Computer Science University of Technology Sydney The University of Westem Australia PO Box 123, Broadway 35 Stirling Highway, Crawley NSW 2007, Australia WA 6009, Australia ahmed@eng.uts.edu ...

Research paper thumbnail of Effect of local measure on performance of the ant feature selection algorithm

... Feature Selection Algorithm Ahmed AI-Ani Faculty of Engineering University of Technology, Syd... more ... Feature Selection Algorithm Ahmed AI-Ani Faculty of Engineering University of Technology, Sydney Broadway, NSW 2007, Australia ahmed@eng.uts.edu.au Abstract-The ant feature selection algorithm has recently been proposed as a new method for feature subset selection. ...

Research paper thumbnail of Swarm intelligence in myoelectric control: particle swarm based dimensionality reduction

Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search:... more Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search: The ACM Digital Library The Guide. ...

Research paper thumbnail of Swarmed Discriminant Analysis for Multifunction Prosthesis Control

Research paper thumbnail of An enhanced Neural Network Ensemble for automatic sleep scoring

... Systems Faculty of Engineering and Information Technology University of Technology Sydney, Au... more ... Systems Faculty of Engineering and Information Technology University of Technology Sydney, Australia Email: alsukker@eng.uts.edu.au ... Systems Faculty of Engineering and Information Technology University of Technology Sydney, Australia Email: ahmed@eng.uts.edu.au ...

Research paper thumbnail of Detection of alertness states using electroencephalogram and cortical auditory evoked potential responses

Research paper thumbnail of A Review of Literature of Initial Trust in E-Services: The Case of Internet Banking Services in Jordanian Context

Research paper thumbnail of Conceptualizing Initial Trust in Internet Banking Services: A Pilot Study

Research paper thumbnail of An efficient steganography method for hiding patient confidential information

This paper deals with the important issue of security and confidentiality of patient information ... more This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

Research paper thumbnail of A novel tamper detection-recovery and watermarking system for medical image authentication and EPR hiding

Recently, the literature has witnessed an increasing interest in the study of medical image water... more Recently, the literature has witnessed an increasing interest in the study of medical image watermarking and recovery techniques. In this article, a novel image tamper localization and recovery technique for medical image authentication is proposed. The sparse coding of the Electronic Patient Record (EPR) and the reshaped region of Interest (ROI) is embedded in the transform domain of the Region of Non-Interest (RONI). The first part of the sparse coded watermark is use for saving the patient information along with the image, whereas the second part is used for authentication purpose. When the watermarked image is tampered during transmission between hospitals and medical clinics, the embedded sparse coded ROI can be extracted to recover the tampered image. The experimental results demonstrate the efficiency of the proposed technique in term of tamper correction capability, robustness to attacks, and imperceptibility.

Research paper thumbnail of An Efficient Hybrid Steganography Method Based on Edge Adaptive and Tree Based Parity Check

ABSTRACT A major requirement for any steganography method is to minimize the changes that are int... more ABSTRACT A major requirement for any steganography method is to minimize the changes that are introduced to the cover image by the data embedding process. Since the Human Visual System (HVS) is less sensitive to changes in sharp regions compared to smooth regions, edge adaptive has been proposed to discover edge regions and enhance the quality of the stego image as well as improve the embedding capacity. However, edge adaptive does not apply any coding scheme, and hence it embedding efficiency may not be optimal. In this paper, we propose a method that enhances edge adaptive by incorporating the Tree-Based Parity Check (TBPC) algorithm, which is a well-established coding-based steganography method. This combination enables not only the identification of potential pixels for embedding, but it also enhances the embedding efficiency through an efficient coding mechanism. More specifically, the method identifies the embedding locations according to the difference value between every two adjacent pixels, that form a block, in the cover image, and the number of embedding bits in each block is determined based on the difference between its two pixels. The incorporation of TBPC minimizes the modifications of the cover image, as it changes no more than two bits out of seven pixel bits when embedding four secret bits. Experimental results show that the proposed scheme can achieve both large embedding payload and high embedding efficiency.

Research paper thumbnail of A highly secure oblivious sparse coding-based watermarking system for ownership verification

ABSTRACT In the last few decades, the watermarking security issue has become one of the main chal... more ABSTRACT In the last few decades, the watermarking security issue has become one of the main challenges facing the design of watermarking techniques. In this paper, a secure oblivious watermarking system, based on Sparse Coding (SC) is proposed in order to tackle the three most critical watermarking security problems, i.e., unauthorized reading, false positive detection, and multiple claims of ownership problems, as well as optimize the fidelity, imperceptibility, and robustness characteristics. The reason for incorporating SC in the proposed system is to encode the watermark image before embedding it in the host image. This process is implemented using the well-known Stagewise Orthogonal Matching Pursuit (StOMP) method and an orthogonal dictionary that is derived from the host image itself. The watermark embedding is implemented in the transform domain of the Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) of the host image. The proposed system is oblivious, as it does not need the original host image when extracting the embedded watermark. In addition, it is suitable for both bi-level and gray-level watermarks, and can accommodate large watermarks that are up to half the size of the host image. The proposed SC–DWT–SVD based watermarking scheme is tested for various malicious and un-malicious attacks and the experimental results show that it realizes the security requirement as it tackles the false positive detection and multiple claims of ownership problems on one hand and generates an encryption form of the watermark on the other hand. In addition, the added security does not compromise the imperceptibility and robustness aspects of the proposed technique and hence can be considered to be comparable or superior to other up-to-date watermarking techniques.

Research paper thumbnail of Fuzzy Logic-Based Automatic Alertness State Classification Using Multi-channel EEG Data

Research paper thumbnail of Factors Influencing Customer's Initial Trust of Internet Banking Services in the Jordanian Context

Research paper thumbnail of A New Image-Processing-Based Technique for Measuring Leaf Dimensions