Mona Morsi - Academia.edu (original) (raw)
Papers by Mona Morsi
arXiv (Cornell University), Feb 4, 2024
IOSR Journal of Computer Engineering, 2014
Proceedings of the 5th International Conference on Digital Health 2015 - DH '15, 2015
E-health is defined as the use of information and communications technologies (ICT) in supporting... more E-health is defined as the use of information and communications technologies (ICT) in supporting health and health-related fields. The goal of this review is to survey efforts and accomplishments performed on e-health systems in Egypt, assess their potential impact, and guide future implementations and evaluations. The review shows that Egypt has still a long way to go in realizing a fully integrated efficient e-health system, but there is an undeniable hope that it has started on the long tedious journey towards e-health system.
International Journal of Image, Graphics and Signal Processing, 2014
Voting is a fundamental decision making instrument in any consensus-based society and democracy d... more Voting is a fundamental decision making instrument in any consensus-based society and democracy depends on the proper administration of popular elections. In any election, there exists a set of requirements among which voters should receive assurance that their intent was correctly captured and that all eligible votes were correctly tallied. On the other hand, the election system as a whole should ensure that voter coercion is unlikely. These conflicting requirements present a significant challenge: how can voters receive enough assurance to trust the election result, but not so much that they can prove to a potential coercer how they voted. The challenge of changing the traditional paper based voting methods used in many developing countries into electronic voting raises a set of functional and constitutional requirements. These requirements are governed by the country in which they operate and are usually not limited to privacy, authentication, fairness, transparency, integrity an...
People often transmit digital images over the internet and JPEG is one of the most common used fo... more People often transmit digital images over the internet and JPEG is one of the most common used formats. Steganography is the art and science of hiding communication; the information hiding process thus uses an image as a cover medium to embed a hidden message. Steganalysis is the inverse process of trying to identify the existence of hidden message in a cover image. In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm. The key idea is related to the selection of an "optimal" value of β (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of β for 64 shifting steps worked on an image, an optimal β is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original...
In this paper we present the applications of image encryption techniques and channel coding techn... more In this paper we present the applications of image encryption techniques and channel coding techniques, to design scheme effective for secure image transmission over wireless channels, we present three proposed scheme as follow: First scheme apply image encryption by a combination of hybrid chaotic maps using Baker map and our proposed Hénon chaotic map 3 in three different modes of operations, beside using fractional Fourier transform (FRFT). Second image encryption scheme is combine the main advantages of FRFT, Arnold cat map for confusion and our proposed Hénon chaotic map 3 for diffusion. Third scheme based on combination of hybrid chaotic encryption and low density parity check (LDPC) to secure transmission of image over wireless channel. Our proposed scheme improve throughput. The proposed scheme enhanced the performance parameters and achieved both security and reliability of image transmission over wireless channels.
International Journal of Advanced Research in Computer Science and Electronics Engineering, 2017
Copy–move image tampering is one of the most frequently tampering types that contaminate images a... more Copy–move image tampering is one of the most frequently tampering types that contaminate images authenticity due to its ease. Tampering detection becomes more difficult when the tampered parts are subjected to post operations like scaling, rotation, compression or noise. In this paper, a blind copy-move tampering detection and localization method is proposed. Its novelty lies in the combination of SIFT, PCA and DBSCAN techniques. The proposed method shows its potential to disclose and localize tampered regions of different sizes and shapes. Furthermore, our method requires no prior information about the image or the manipulation operations carried on it. A comparative analysis between the proposed method and other tampering detection methods is evaluated based on various performance measures. Our experimental results show that the proposed method outperforms the previous reported techniques and is quite reliable in copy-move tampering detection and localization.
World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2009
Traditional principal components analysis (PCA) techniques for face recognition are based on batc... more Traditional principal components analysis (PCA) techniques for face recognition are based on batch-mode training using a pre-available image set. Real world applications require that the training set be dynamic of evolving nature where within the framework of continuous learning, new training images are continuously added to the original set; this would trigger a costly continuous re-computation of the eigen space representation via repeating an entire batch-based training that includes the old and new images. Incremental PCA methods allow adding new images and updating the PCA representation. In this paper, two incremental PCA approaches, CCIPCA and IPCA, are examined and compared. Besides, different learning and testing strategies are proposed and applied to the two algorithms. The results suggest that batch PCA is inferior to both incremental approaches, and that all CCIPCAs are practically equivalent.
N Egypt, the physician in public clinics deals with a huge number of patients. According to a res... more N Egypt, the physician in public clinics deals with a huge number of patients. According to a research done by World Bank in 2018 [1], the number of physicians per thousand patients is 0.5. This makes it very difficult for physicians to manage and follow up with patients on a paper basis or in separate islands. The availability and feasibility to reach patients’ medical records wherever and whenever it is needed is a key issue to enhance healthcare. The author in [2] highlighted that patients’ satisfaction is a key factor to a successful health system. Many elements contribute
WSEAS Transactions on Computers archive, 2008
In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks ... more In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm using JPEG digital images. The key idea is related to the selection of an "optimal" value of β (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of β for 64 shifting steps worked on an image, an optimal β is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original one. Both algorithms were tested and compared using two sets of test images. The first set uses reference test data of 20 grayscale images [1], and the second uses 432 images created by manipulating 12 images for various image parameters: two sizes (300×400 and 150×2000), six JPEG old quality factors (50, 60, 70, 80, 90, 100), and 3 message...
Face recognition has recently received significant attention as one of the challenging and promis... more Face recognition has recently received significant attention as one of the challenging and promising fields of computer vision and pattern recognition. It plays a significant role in many security and forensic applications such as person authentication in access control systems and person identification in real time video surveillance systems. This paper studies two appearance-based approaches for feature extraction and dimension reduction, namely, Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA). Numerical experiments were carried out on the ORL face database and many parameters were investigated, this included the effect of changing the number of training images, scaling factor, and the effect of feature vector length on the recognition rate. Classification is performed using the minimum Euclidean distance. The results suggest that the effect of increasing the number of training images has more significance on the recognition rate than changing the image ...
ryptography is study of transforming information in order to make it secure from unintended recip... more ryptography is study of transforming information in order to make it secure from unintended recipients. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts any information [picture, printed text, etc] such that decryption can be performed using human visual system. The goal of this survey paper is to give the readers an overview of the basic visual cryptography schemes constructions, as well as the new techniques derived from VCS. We also review some applications that take advantage of such secure schemes. KeywordsVisual cryptography schemes (VCS), Extended Visual Cryptography (EVC), Universal Share, Contrast,
Face detection has various applications in many areas, an important example of which is security-... more Face detection has various applications in many areas, an important example of which is security-related surveillance in confined areas. Once an image is analyzed for faces detection, the faces in the image are tallied. In this paper, color segmentation is used as a first step in the face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to constraints for ...
The challenge in the case of image authentication is that in many cases images need to be subject... more The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting. Keywords—Authentication, DCT, JPEG, Watermarking.
Automatic human face detection is considered as the initial process of any fully automatic system... more Automatic human face detection is considered as the initial process of any fully automatic system that analyzes the information contained in human faces (e.g., identity, gender, expression, age, race and pose). In this paper, color segmentation is used as a first step in the human face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to constraints for rejecting non-face blobs. The system was implemented and validated for images with different formats, sizes, number of people, and complexity of the image background.
Ain Shams Engineering Journal
Abstract Sharing secrets and safeguarding them while being sent over insecure channel is a crucia... more Abstract Sharing secrets and safeguarding them while being sent over insecure channel is a crucial matter. Visual Cryptography still has the strong potential to secure this critical issue. In this paper, a new master key (n,n) visual cryptography scheme is proposed. The novelty of the proposed scheme is the generation of the master key using Station-to-Station Diffie Hellman algorithm. Moreover, one or more hierarchical shares could be generated for each secret image depending on the degree of security required. The performance of the shares generation technique is compared to others where it proves to be more robust to attacks. The algorithm satisfies all the basics of security: confidentiality, integrity and availability. This was evaluated by different tests like histograms, and entropy. Its security was analyzed against other vulnerabilities by evaluating the effect of man in middle attack and Evesdropping. Experimental results demonstrate that the scheme is highly secure.
2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2016
This article proposes a gender and geographical origin recognition system for Arabic speakers bas... more This article proposes a gender and geographical origin recognition system for Arabic speakers based on the dialect and accent characteristics. We demonstrate that the speaker gender and nationality can be determined from colloquial Arabic speech and recommend that this system can be integrated to more complex biometric applications. The acoustic features of our proposed dataset used to identify the speaker's dialect and accent, are extracted using Mel Frequency Cepstral Coefficients (MFCC) and Relative Spectral Analysis (RASTA) techniques. We compare results of classification based on Gaussian Mixture Model with Universal Background Model (GMM-UBM) and Identity Vector (I-vector) classifiers implemented using the MSR Identity Toolbox, which is a MATLAB toolbox for speaker-recognition research from Microsoft. The results show a significant decrease of equal error rate (EER) when recognizing dialect or accent based on gender. In addition, feature fusion of RASTA and MFCC is used to enhance the EER. Results show a 9.8% enhancement in EER over using the RASTA features only.
Journal of Information Security and Applications
Abstract Automatic human face detection is considered as the initial process of any fully automat... more Abstract Automatic human face detection is considered as the initial process of any fully automatic system that analyzes the information contained in human faces (eg, identity, gender, expression, age, race and pose). In this paper, color segmentation is used as a first step in the human face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to ...
arXiv (Cornell University), Feb 4, 2024
IOSR Journal of Computer Engineering, 2014
Proceedings of the 5th International Conference on Digital Health 2015 - DH '15, 2015
E-health is defined as the use of information and communications technologies (ICT) in supporting... more E-health is defined as the use of information and communications technologies (ICT) in supporting health and health-related fields. The goal of this review is to survey efforts and accomplishments performed on e-health systems in Egypt, assess their potential impact, and guide future implementations and evaluations. The review shows that Egypt has still a long way to go in realizing a fully integrated efficient e-health system, but there is an undeniable hope that it has started on the long tedious journey towards e-health system.
International Journal of Image, Graphics and Signal Processing, 2014
Voting is a fundamental decision making instrument in any consensus-based society and democracy d... more Voting is a fundamental decision making instrument in any consensus-based society and democracy depends on the proper administration of popular elections. In any election, there exists a set of requirements among which voters should receive assurance that their intent was correctly captured and that all eligible votes were correctly tallied. On the other hand, the election system as a whole should ensure that voter coercion is unlikely. These conflicting requirements present a significant challenge: how can voters receive enough assurance to trust the election result, but not so much that they can prove to a potential coercer how they voted. The challenge of changing the traditional paper based voting methods used in many developing countries into electronic voting raises a set of functional and constitutional requirements. These requirements are governed by the country in which they operate and are usually not limited to privacy, authentication, fairness, transparency, integrity an...
People often transmit digital images over the internet and JPEG is one of the most common used fo... more People often transmit digital images over the internet and JPEG is one of the most common used formats. Steganography is the art and science of hiding communication; the information hiding process thus uses an image as a cover medium to embed a hidden message. Steganalysis is the inverse process of trying to identify the existence of hidden message in a cover image. In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm. The key idea is related to the selection of an "optimal" value of β (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of β for 64 shifting steps worked on an image, an optimal β is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original...
In this paper we present the applications of image encryption techniques and channel coding techn... more In this paper we present the applications of image encryption techniques and channel coding techniques, to design scheme effective for secure image transmission over wireless channels, we present three proposed scheme as follow: First scheme apply image encryption by a combination of hybrid chaotic maps using Baker map and our proposed Hénon chaotic map 3 in three different modes of operations, beside using fractional Fourier transform (FRFT). Second image encryption scheme is combine the main advantages of FRFT, Arnold cat map for confusion and our proposed Hénon chaotic map 3 for diffusion. Third scheme based on combination of hybrid chaotic encryption and low density parity check (LDPC) to secure transmission of image over wireless channel. Our proposed scheme improve throughput. The proposed scheme enhanced the performance parameters and achieved both security and reliability of image transmission over wireless channels.
International Journal of Advanced Research in Computer Science and Electronics Engineering, 2017
Copy–move image tampering is one of the most frequently tampering types that contaminate images a... more Copy–move image tampering is one of the most frequently tampering types that contaminate images authenticity due to its ease. Tampering detection becomes more difficult when the tampered parts are subjected to post operations like scaling, rotation, compression or noise. In this paper, a blind copy-move tampering detection and localization method is proposed. Its novelty lies in the combination of SIFT, PCA and DBSCAN techniques. The proposed method shows its potential to disclose and localize tampered regions of different sizes and shapes. Furthermore, our method requires no prior information about the image or the manipulation operations carried on it. A comparative analysis between the proposed method and other tampering detection methods is evaluated based on various performance measures. Our experimental results show that the proposed method outperforms the previous reported techniques and is quite reliable in copy-move tampering detection and localization.
World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2009
Traditional principal components analysis (PCA) techniques for face recognition are based on batc... more Traditional principal components analysis (PCA) techniques for face recognition are based on batch-mode training using a pre-available image set. Real world applications require that the training set be dynamic of evolving nature where within the framework of continuous learning, new training images are continuously added to the original set; this would trigger a costly continuous re-computation of the eigen space representation via repeating an entire batch-based training that includes the old and new images. Incremental PCA methods allow adding new images and updating the PCA representation. In this paper, two incremental PCA approaches, CCIPCA and IPCA, are examined and compared. Besides, different learning and testing strategies are proposed and applied to the two algorithms. The results suggest that batch PCA is inferior to both incremental approaches, and that all CCIPCAs are practically equivalent.
N Egypt, the physician in public clinics deals with a huge number of patients. According to a res... more N Egypt, the physician in public clinics deals with a huge number of patients. According to a research done by World Bank in 2018 [1], the number of physicians per thousand patients is 0.5. This makes it very difficult for physicians to manage and follow up with patients on a paper basis or in separate islands. The availability and feasibility to reach patients’ medical records wherever and whenever it is needed is a key issue to enhance healthcare. The author in [2] highlighted that patients’ satisfaction is a key factor to a successful health system. Many elements contribute
WSEAS Transactions on Computers archive, 2008
In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks ... more In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm using JPEG digital images. The key idea is related to the selection of an "optimal" value of β (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of β for 64 shifting steps worked on an image, an optimal β is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original one. Both algorithms were tested and compared using two sets of test images. The first set uses reference test data of 20 grayscale images [1], and the second uses 432 images created by manipulating 12 images for various image parameters: two sizes (300×400 and 150×2000), six JPEG old quality factors (50, 60, 70, 80, 90, 100), and 3 message...
Face recognition has recently received significant attention as one of the challenging and promis... more Face recognition has recently received significant attention as one of the challenging and promising fields of computer vision and pattern recognition. It plays a significant role in many security and forensic applications such as person authentication in access control systems and person identification in real time video surveillance systems. This paper studies two appearance-based approaches for feature extraction and dimension reduction, namely, Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA). Numerical experiments were carried out on the ORL face database and many parameters were investigated, this included the effect of changing the number of training images, scaling factor, and the effect of feature vector length on the recognition rate. Classification is performed using the minimum Euclidean distance. The results suggest that the effect of increasing the number of training images has more significance on the recognition rate than changing the image ...
ryptography is study of transforming information in order to make it secure from unintended recip... more ryptography is study of transforming information in order to make it secure from unintended recipients. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts any information [picture, printed text, etc] such that decryption can be performed using human visual system. The goal of this survey paper is to give the readers an overview of the basic visual cryptography schemes constructions, as well as the new techniques derived from VCS. We also review some applications that take advantage of such secure schemes. KeywordsVisual cryptography schemes (VCS), Extended Visual Cryptography (EVC), Universal Share, Contrast,
Face detection has various applications in many areas, an important example of which is security-... more Face detection has various applications in many areas, an important example of which is security-related surveillance in confined areas. Once an image is analyzed for faces detection, the faces in the image are tallied. In this paper, color segmentation is used as a first step in the face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to constraints for ...
The challenge in the case of image authentication is that in many cases images need to be subject... more The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting. Keywords—Authentication, DCT, JPEG, Watermarking.
Automatic human face detection is considered as the initial process of any fully automatic system... more Automatic human face detection is considered as the initial process of any fully automatic system that analyzes the information contained in human faces (e.g., identity, gender, expression, age, race and pose). In this paper, color segmentation is used as a first step in the human face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to constraints for rejecting non-face blobs. The system was implemented and validated for images with different formats, sizes, number of people, and complexity of the image background.
Ain Shams Engineering Journal
Abstract Sharing secrets and safeguarding them while being sent over insecure channel is a crucia... more Abstract Sharing secrets and safeguarding them while being sent over insecure channel is a crucial matter. Visual Cryptography still has the strong potential to secure this critical issue. In this paper, a new master key (n,n) visual cryptography scheme is proposed. The novelty of the proposed scheme is the generation of the master key using Station-to-Station Diffie Hellman algorithm. Moreover, one or more hierarchical shares could be generated for each secret image depending on the degree of security required. The performance of the shares generation technique is compared to others where it proves to be more robust to attacks. The algorithm satisfies all the basics of security: confidentiality, integrity and availability. This was evaluated by different tests like histograms, and entropy. Its security was analyzed against other vulnerabilities by evaluating the effect of man in middle attack and Evesdropping. Experimental results demonstrate that the scheme is highly secure.
2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2016
This article proposes a gender and geographical origin recognition system for Arabic speakers bas... more This article proposes a gender and geographical origin recognition system for Arabic speakers based on the dialect and accent characteristics. We demonstrate that the speaker gender and nationality can be determined from colloquial Arabic speech and recommend that this system can be integrated to more complex biometric applications. The acoustic features of our proposed dataset used to identify the speaker's dialect and accent, are extracted using Mel Frequency Cepstral Coefficients (MFCC) and Relative Spectral Analysis (RASTA) techniques. We compare results of classification based on Gaussian Mixture Model with Universal Background Model (GMM-UBM) and Identity Vector (I-vector) classifiers implemented using the MSR Identity Toolbox, which is a MATLAB toolbox for speaker-recognition research from Microsoft. The results show a significant decrease of equal error rate (EER) when recognizing dialect or accent based on gender. In addition, feature fusion of RASTA and MFCC is used to enhance the EER. Results show a 9.8% enhancement in EER over using the RASTA features only.
Journal of Information Security and Applications
Abstract Automatic human face detection is considered as the initial process of any fully automat... more Abstract Automatic human face detection is considered as the initial process of any fully automatic system that analyzes the information contained in human faces (eg, identity, gender, expression, age, race and pose). In this paper, color segmentation is used as a first step in the human face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to ...