Khaled Merit - Academia.edu (original) (raw)
Papers by Khaled Merit
Proceedings of the 9th International Conference on Information Systems and Technologies
Reliable identification of individuals is a field in full growth. It is very requested in many ar... more Reliable identification of individuals is a field in full growth. It is very requested in many areas, not only in the military environments or police but also in many civil applications, for example, the control of access to the systems of financial transactions (banks, cash flow...etc.). Traditional systems of security are based on knowledge (password, PIN-code...) or on a possession (badge, magnetic card, key, etc.), but these systems are less reliable for many environments, because of their inadequacy common to differentiate between an individual actually authorized and a fraudster (individual having acquired access privileges fraudulently). The solution to these problems has been found in the authentication technologies based on biometrics. A biometric system is a system of recognition of patterns which establishes the authenticity of a character, physiological or behavioral specific. The identification may be in the form of verification of identity (verification of the authenticity of a purported identity) or in the form of recognition (find the correspondence between identity and another among a set of known persons). Many biometric technologies have been developed, all based on biometric identifiers (iris, voice, fingerprints, face, signature...). In this article, we propose a method of biometric recognition of a person by fingerprint based on wavelet transforms.
Load-balancing techniques have become a critical function in cloud storage systems that consist o... more Load-balancing techniques have become a critical function in cloud storage systems that consist of complex heterogeneous networks of nodes with different capacities. However, the convergence rate of any load-balancing algorithm as well as its performance deteriorated as the number of nodes in the system, the diameter of the network and the communication overhead increased. Therefore, this paper presents an approach aims at scaling the system out not up - in other words, allowing the system to be expanded by adding more nodes without the need to increase the power of each node while at the same time increasing the overall performance of the system. Also, our proposal aims at improving the performance by not only considering the parameters that will affect the algorithm performance but also simplifying the structure of the network that will execute the algorithm. Our proposal was evaluated through mathematical analysis as well as computer simulations, and it was compared with the cent...
Proceedings of the 9th International Conference on Information Systems and Technologies, 2019
In the last decade, facial recognition techniques are considered the most important fields of res... more In the last decade, facial recognition techniques are considered the most important fields of research in biometric technology. In this research paper, we present a Face Recognition (FR) system based on the Viola-Jones face detection algorithm, discrete wavelet transform (DWT), facial image enhancement using histogram equalization (HE) algorithm, and deep convolution neural network. Extraction results of facial features using DWT are used directly to train the CNN network, this network composed of three convolution layers, two pooling layers, a fully-connected layer, and one softmax regression layer. The face recognition rate based on this network is 99.85% and 99.80%. The face recognition rate of the ORL face database and the AR face database based on this network achieved 99.85% and 99.80% respectively.
Global System for Mobile Communications (GSM) is one of the most commonly used cellular technolog... more Global System for Mobile Communications (GSM) is one of the most commonly used cellular technologies in the world. One of the objectives in mobile communication systems is the security of the exchanged data. GSM employs many cryptographic algorithms for security like A5/1, A5/2 and A5/3. Even so, these algorithms do not provide sufficient level of security for protecting the confidentiality of GSM. Therefore, it is desirable to increase security by additional encryption methods. This paper presents a voice encryption method called: “RSA with Random permutation and Inversion”, based on current voice channel, which overcomes data channel's insufficiencies and solves the problem of penetrating the RPE-LTP vocoder by the encrypted voice. The proposed method fulfils an end-to-end secured communication in the GSM; insure a good compatibility to all GSM networks, and easy implementation without any modification in these systems.
2018 6th International Conference on Control Engineering & Information Technology (CEIT), 2018
To recognize and automatically identify the identities of individuals, there are several biometri... more To recognize and automatically identify the identities of individuals, there are several biometric identification systems based on physiological and behavioral characteristics, in our work we are interested in face recognition, which is a recent biometric authentication technology. This technology offers a reasonable level of precision. In this paper, we propose a method of biometric recognition of a person by their face using the wavelet transform. For our application, we have opted for different types of wavelets in order to decompose the region of interest. The evaluation and judgment of each type in relation to the other is given by the calculation of the parameters Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). The experimental results were performed using the FEI database.
2018 International Conference on Signal, Image, Vision and their Applications (SIVA), 2018
Universal Mobile Telecommunications System) is a 3rd generation communication system that uses WC... more Universal Mobile Telecommunications System) is a 3rd generation communication system that uses WCDMA access technology (Wideband Code Division Multiple Access) to obtain high data rates and ensure better quality of multimedia communications. MPEG-4 (Moving Picture Experts Group) is widely used for video transmission services on any network because of the good quality of service it provides. UMTS has several radio channels for transporting data to and from these mobile users. This article focuses on a comparative study between the DCH channel (Dedicated Transport Channel) and the HS-DSCH channel (High Speed Downlink Shared Channel) by analyzing the qualities as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc. offered by each of them in order to determine the suitable video transmission.
2018 International Conference on Signal, Image, Vision and their Applications (SIVA), 2018
The important objective of image compression is reducing the quantity of data required by the app... more The important objective of image compression is reducing the quantity of data required by the applying an image encoding. This reduction is needed for transmission or database storage. Our used is based on the Wavelet transform in image compression. It offers ascend to numerous applications in different fields, for example, geophysics, astronomy, media communications, imaging, and video coding. This contribution presents an application in the compression of the biometric image based on the second-generation wavelet with lifting and combined with SPIHT progressive encoder. To study the reliability and performance of these algorithms, we apply them on iris image and use the image quality assessment with full reference (PSNR, MSSIM, VIF) and without reference (NIQE, BLIINDS). The obtained results are very interestingly and encouraging.
Proceedings of the 9th International Conference on Information Systems and Technologies, 2019
4G Mobile communication system LTE is the recent 3GPP (3d generation partnership project) standar... more 4G Mobile communication system LTE is the recent 3GPP (3d generation partnership project) standard for Radio communications, it uses a full IP infrastructure and erase the older CS (Circuit Switched) systems by using only PS (Packet switched) in his EPC (Evolved Packet Core). This evolution posed a problem for operators to support Voice service in 4G LTE without depending on their 2G and 3G networks. 3GPP and GSMA (GSM Association) offered a wonderful solution for that to support voice over IP (VoIP), and that by installing an IMS (IP Multimedia Subsystem) infrastructure that offer voice service and connect LTE Network to it, we call that "VoLTE". Therefore, VoLTE is clearly the future of voice communications since it is over IP and it is compatible with NGN (Next Generation Network) in the fixed network part, also it can ensure a very good QoS (Quality of Service) because IP packet was designed to support high data throughput. This research paper analyzes the influence of link utilization and network congestion on end-to-end basis VoLTE performance. Different scenarios are simulated using LTE-Sim simulator tool in a good way. Finally, comparison among them is provided
Electronics, 2019
Facial expression recognition (FER) has become one of the most important fields of research in pa... more Facial expression recognition (FER) has become one of the most important fields of research in pattern recognition. In this paper, we propose a method for the identification of facial expressions of people through their emotions. Being robust against illumination changes, this method combines four steps: Viola–Jones face detection algorithm, facial image enhancement using contrast limited adaptive histogram equalization (CLAHE) algorithm, the discrete wavelet transform (DWT), and deep convolutional neural network (CNN). We have used Viola–Jones to locate the face and facial parts; the facial image is enhanced using CLAHE; then facial features extraction is done using DWT; and finally, the extracted features are used directly to train the CNN network, for the purpose of classifying the facial expressions. Our experimental work was performed on the CK+ database and JAFFE face database. The results obtained using this network were 96.46% and 98.43%, respectively.
International Journal of Distributed and Parallel systems, 2012
Global System for Mobile Communications (GSM) is one of the most commonly used cellular technolog... more Global System for Mobile Communications (GSM) is one of the most commonly used cellular technologies in the world. One of the objectives in mobile communication systems is the security of the exchanged data. GSM employs many cryptographic algorithms for security like A5/1, A5/2 and A5/3. Even so, these algorithms do not provide sufficient level of security for protecting the confidentiality of GSM. Therefore, it is desirable to increase security by additional encryption methods. This paper presents a voice encryption method called: "DES with Random permutation and Inversion", based on current voice channel, which overcomes data channel's insufficiencies and solves the problem of penetrating the RPE-LTP vocoder by the encrypted voice. The proposed method fulfils an end-to-end secured communication in the GSM; insure a good compatibility to all GSM networks, and easy implementation without any modification in these systems.
World Academy of Science, Engineering and Technology, International Journal of Electronics and Communication Engineering, 2015
Proceedings of the 7th …, 2008
Abstract: - Robust face recognition under various illumination environments is essential for succ... more Abstract: - Robust face recognition under various illumination environments is essential for successful commercialization. Feature-based face recognition relies on a good choice of feature vectors. However, there is no feature vector invariant under illumination changes even ...
Global System for Mobile Communications (GSM) is one of the most commonly used cellular technolog... more Global System for Mobile Communications (GSM) is one of the most commonly used cellular technologies in the world. One of the objectives in mobile communication systems is the security of the exchanged data. GSM employs many cryptographic algorithms for security like A5/1, A5/2 and A5/3. Even so, these algorithms do not provide sufficient level of security for protecting the confidentiality of GSM. Therefore, it is desirable to increase security by additional encryption methods. This paper presents a voice encryption method called: “DES with Random permutation and Inversion”, based on current voice channel, which overcomes data channel's insufficiencies and solves the problem of penetrating the RPE-LTP vocoder by the encrypted voice. The proposed method fulfils an end-to-end
secured communication in the GSM; insure a good ompatibility to all GSM networks, and easy implementation without any modification in these systems.
Proceedings of the 9th International Conference on Information Systems and Technologies
Reliable identification of individuals is a field in full growth. It is very requested in many ar... more Reliable identification of individuals is a field in full growth. It is very requested in many areas, not only in the military environments or police but also in many civil applications, for example, the control of access to the systems of financial transactions (banks, cash flow...etc.). Traditional systems of security are based on knowledge (password, PIN-code...) or on a possession (badge, magnetic card, key, etc.), but these systems are less reliable for many environments, because of their inadequacy common to differentiate between an individual actually authorized and a fraudster (individual having acquired access privileges fraudulently). The solution to these problems has been found in the authentication technologies based on biometrics. A biometric system is a system of recognition of patterns which establishes the authenticity of a character, physiological or behavioral specific. The identification may be in the form of verification of identity (verification of the authenticity of a purported identity) or in the form of recognition (find the correspondence between identity and another among a set of known persons). Many biometric technologies have been developed, all based on biometric identifiers (iris, voice, fingerprints, face, signature...). In this article, we propose a method of biometric recognition of a person by fingerprint based on wavelet transforms.
Load-balancing techniques have become a critical function in cloud storage systems that consist o... more Load-balancing techniques have become a critical function in cloud storage systems that consist of complex heterogeneous networks of nodes with different capacities. However, the convergence rate of any load-balancing algorithm as well as its performance deteriorated as the number of nodes in the system, the diameter of the network and the communication overhead increased. Therefore, this paper presents an approach aims at scaling the system out not up - in other words, allowing the system to be expanded by adding more nodes without the need to increase the power of each node while at the same time increasing the overall performance of the system. Also, our proposal aims at improving the performance by not only considering the parameters that will affect the algorithm performance but also simplifying the structure of the network that will execute the algorithm. Our proposal was evaluated through mathematical analysis as well as computer simulations, and it was compared with the cent...
Proceedings of the 9th International Conference on Information Systems and Technologies, 2019
In the last decade, facial recognition techniques are considered the most important fields of res... more In the last decade, facial recognition techniques are considered the most important fields of research in biometric technology. In this research paper, we present a Face Recognition (FR) system based on the Viola-Jones face detection algorithm, discrete wavelet transform (DWT), facial image enhancement using histogram equalization (HE) algorithm, and deep convolution neural network. Extraction results of facial features using DWT are used directly to train the CNN network, this network composed of three convolution layers, two pooling layers, a fully-connected layer, and one softmax regression layer. The face recognition rate based on this network is 99.85% and 99.80%. The face recognition rate of the ORL face database and the AR face database based on this network achieved 99.85% and 99.80% respectively.
Global System for Mobile Communications (GSM) is one of the most commonly used cellular technolog... more Global System for Mobile Communications (GSM) is one of the most commonly used cellular technologies in the world. One of the objectives in mobile communication systems is the security of the exchanged data. GSM employs many cryptographic algorithms for security like A5/1, A5/2 and A5/3. Even so, these algorithms do not provide sufficient level of security for protecting the confidentiality of GSM. Therefore, it is desirable to increase security by additional encryption methods. This paper presents a voice encryption method called: “RSA with Random permutation and Inversion”, based on current voice channel, which overcomes data channel's insufficiencies and solves the problem of penetrating the RPE-LTP vocoder by the encrypted voice. The proposed method fulfils an end-to-end secured communication in the GSM; insure a good compatibility to all GSM networks, and easy implementation without any modification in these systems.
2018 6th International Conference on Control Engineering & Information Technology (CEIT), 2018
To recognize and automatically identify the identities of individuals, there are several biometri... more To recognize and automatically identify the identities of individuals, there are several biometric identification systems based on physiological and behavioral characteristics, in our work we are interested in face recognition, which is a recent biometric authentication technology. This technology offers a reasonable level of precision. In this paper, we propose a method of biometric recognition of a person by their face using the wavelet transform. For our application, we have opted for different types of wavelets in order to decompose the region of interest. The evaluation and judgment of each type in relation to the other is given by the calculation of the parameters Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). The experimental results were performed using the FEI database.
2018 International Conference on Signal, Image, Vision and their Applications (SIVA), 2018
Universal Mobile Telecommunications System) is a 3rd generation communication system that uses WC... more Universal Mobile Telecommunications System) is a 3rd generation communication system that uses WCDMA access technology (Wideband Code Division Multiple Access) to obtain high data rates and ensure better quality of multimedia communications. MPEG-4 (Moving Picture Experts Group) is widely used for video transmission services on any network because of the good quality of service it provides. UMTS has several radio channels for transporting data to and from these mobile users. This article focuses on a comparative study between the DCH channel (Dedicated Transport Channel) and the HS-DSCH channel (High Speed Downlink Shared Channel) by analyzing the qualities as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc. offered by each of them in order to determine the suitable video transmission.
2018 International Conference on Signal, Image, Vision and their Applications (SIVA), 2018
The important objective of image compression is reducing the quantity of data required by the app... more The important objective of image compression is reducing the quantity of data required by the applying an image encoding. This reduction is needed for transmission or database storage. Our used is based on the Wavelet transform in image compression. It offers ascend to numerous applications in different fields, for example, geophysics, astronomy, media communications, imaging, and video coding. This contribution presents an application in the compression of the biometric image based on the second-generation wavelet with lifting and combined with SPIHT progressive encoder. To study the reliability and performance of these algorithms, we apply them on iris image and use the image quality assessment with full reference (PSNR, MSSIM, VIF) and without reference (NIQE, BLIINDS). The obtained results are very interestingly and encouraging.
Proceedings of the 9th International Conference on Information Systems and Technologies, 2019
4G Mobile communication system LTE is the recent 3GPP (3d generation partnership project) standar... more 4G Mobile communication system LTE is the recent 3GPP (3d generation partnership project) standard for Radio communications, it uses a full IP infrastructure and erase the older CS (Circuit Switched) systems by using only PS (Packet switched) in his EPC (Evolved Packet Core). This evolution posed a problem for operators to support Voice service in 4G LTE without depending on their 2G and 3G networks. 3GPP and GSMA (GSM Association) offered a wonderful solution for that to support voice over IP (VoIP), and that by installing an IMS (IP Multimedia Subsystem) infrastructure that offer voice service and connect LTE Network to it, we call that "VoLTE". Therefore, VoLTE is clearly the future of voice communications since it is over IP and it is compatible with NGN (Next Generation Network) in the fixed network part, also it can ensure a very good QoS (Quality of Service) because IP packet was designed to support high data throughput. This research paper analyzes the influence of link utilization and network congestion on end-to-end basis VoLTE performance. Different scenarios are simulated using LTE-Sim simulator tool in a good way. Finally, comparison among them is provided
Electronics, 2019
Facial expression recognition (FER) has become one of the most important fields of research in pa... more Facial expression recognition (FER) has become one of the most important fields of research in pattern recognition. In this paper, we propose a method for the identification of facial expressions of people through their emotions. Being robust against illumination changes, this method combines four steps: Viola–Jones face detection algorithm, facial image enhancement using contrast limited adaptive histogram equalization (CLAHE) algorithm, the discrete wavelet transform (DWT), and deep convolutional neural network (CNN). We have used Viola–Jones to locate the face and facial parts; the facial image is enhanced using CLAHE; then facial features extraction is done using DWT; and finally, the extracted features are used directly to train the CNN network, for the purpose of classifying the facial expressions. Our experimental work was performed on the CK+ database and JAFFE face database. The results obtained using this network were 96.46% and 98.43%, respectively.
International Journal of Distributed and Parallel systems, 2012
Global System for Mobile Communications (GSM) is one of the most commonly used cellular technolog... more Global System for Mobile Communications (GSM) is one of the most commonly used cellular technologies in the world. One of the objectives in mobile communication systems is the security of the exchanged data. GSM employs many cryptographic algorithms for security like A5/1, A5/2 and A5/3. Even so, these algorithms do not provide sufficient level of security for protecting the confidentiality of GSM. Therefore, it is desirable to increase security by additional encryption methods. This paper presents a voice encryption method called: "DES with Random permutation and Inversion", based on current voice channel, which overcomes data channel's insufficiencies and solves the problem of penetrating the RPE-LTP vocoder by the encrypted voice. The proposed method fulfils an end-to-end secured communication in the GSM; insure a good compatibility to all GSM networks, and easy implementation without any modification in these systems.
World Academy of Science, Engineering and Technology, International Journal of Electronics and Communication Engineering, 2015
Proceedings of the 7th …, 2008
Abstract: - Robust face recognition under various illumination environments is essential for succ... more Abstract: - Robust face recognition under various illumination environments is essential for successful commercialization. Feature-based face recognition relies on a good choice of feature vectors. However, there is no feature vector invariant under illumination changes even ...
Global System for Mobile Communications (GSM) is one of the most commonly used cellular technolog... more Global System for Mobile Communications (GSM) is one of the most commonly used cellular technologies in the world. One of the objectives in mobile communication systems is the security of the exchanged data. GSM employs many cryptographic algorithms for security like A5/1, A5/2 and A5/3. Even so, these algorithms do not provide sufficient level of security for protecting the confidentiality of GSM. Therefore, it is desirable to increase security by additional encryption methods. This paper presents a voice encryption method called: “DES with Random permutation and Inversion”, based on current voice channel, which overcomes data channel's insufficiencies and solves the problem of penetrating the RPE-LTP vocoder by the encrypted voice. The proposed method fulfils an end-to-end
secured communication in the GSM; insure a good ompatibility to all GSM networks, and easy implementation without any modification in these systems.