Mona Morsi - Academia.edu (original) (raw)

Papers by Mona Morsi

Research paper thumbnail of A Survey on Blockchain in E-Government Services: Status and Challenges

arXiv (Cornell University), Feb 4, 2024

Research paper thumbnail of Image Security With Different Techniques Of Cryptography And Coding: A Survey

IOSR Journal of Computer Engineering, 2014

Research paper thumbnail of E-Health in Egypt

Proceedings of the 5th International Conference on Digital Health 2015 - DH '15, 2015

E-health is defined as the use of information and communications technologies (ICT) in supporting... more E-health is defined as the use of information and communications technologies (ICT) in supporting health and health-related fields. The goal of this review is to survey efforts and accomplishments performed on e-health systems in Egypt, assess their potential impact, and guide future implementations and evaluations. The review shows that Egypt has still a long way to go in realizing a fully integrated efficient e-health system, but there is an undeniable hope that it has started on the long tedious journey towards e-health system.

Research paper thumbnail of Combination of Hybrid Chaotic Encryption and LDPC for Secure Transmission of Images over Wireless Networks

International Journal of Image, Graphics and Signal Processing, 2014

Research paper thumbnail of On the development of electronic voting: a survey

Voting is a fundamental decision making instrument in any consensus-based society and democracy d... more Voting is a fundamental decision making instrument in any consensus-based society and democracy depends on the proper administration of popular elections. In any election, there exists a set of requirements among which voters should receive assurance that their intent was correctly captured and that all eligible votes were correctly tallied. On the other hand, the election system as a whole should ensure that voter coercion is unlikely. These conflicting requirements present a significant challenge: how can voters receive enough assurance to trust the election result, but not so much that they can prove to a potential coercer how they voted. The challenge of changing the traditional paper based voting methods used in many developing countries into electronic voting raises a set of functional and constitutional requirements. These requirements are governed by the country in which they operate and are usually not limited to privacy, authentication, fairness, transparency, integrity an...

Research paper thumbnail of Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm

People often transmit digital images over the internet and JPEG is one of the most common used fo... more People often transmit digital images over the internet and JPEG is one of the most common used formats. Steganography is the art and science of hiding communication; the information hiding process thus uses an image as a cover medium to embed a hidden message. Steganalysis is the inverse process of trying to identify the existence of hidden message in a cover image. In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm. The key idea is related to the selection of an "optimal" value of β (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of β for 64 shifting steps worked on an image, an optimal β is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original...

Research paper thumbnail of Applications of Chaotic Maps and Coding for Secure Transmission of Images over Wireless Channels

In this paper we present the applications of image encryption techniques and channel coding techn... more In this paper we present the applications of image encryption techniques and channel coding techniques, to design scheme effective for secure image transmission over wireless channels, we present three proposed scheme as follow: First scheme apply image encryption by a combination of hybrid chaotic maps using Baker map and our proposed Hénon chaotic map 3 in three different modes of operations, beside using fractional Fourier transform (FRFT). Second image encryption scheme is combine the main advantages of FRFT, Arnold cat map for confusion and our proposed Hénon chaotic map 3 for diffusion. Third scheme based on combination of hybrid chaotic encryption and low density parity check (LDPC) to secure transmission of image over wireless channel. Our proposed scheme improve throughput. The proposed scheme enhanced the performance parameters and achieved both security and reliability of image transmission over wireless channels.

Research paper thumbnail of An Improved SIFT-PCA-Based Copy-Move Image Forgery Detection Method

International Journal of Advanced Research in Computer Science and Electronics Engineering, 2017

Copy–move image tampering is one of the most frequently tampering types that contaminate images a... more Copy–move image tampering is one of the most frequently tampering types that contaminate images authenticity due to its ease. Tampering detection becomes more difficult when the tampered parts are subjected to post operations like scaling, rotation, compression or noise. In this paper, a blind copy-move tampering detection and localization method is proposed. Its novelty lies in the combination of SIFT, PCA and DBSCAN techniques. The proposed method shows its potential to disclose and localize tampered regions of different sizes and shapes. Furthermore, our method requires no prior information about the image or the manipulation operations carried on it. A comparative analysis between the proposed method and other tampering detection methods is evaluated based on various performance measures. Our experimental results show that the proposed method outperforms the previous reported techniques and is quite reliable in copy-move tampering detection and localization.

Research paper thumbnail of Evolutionary Eigenspace Learning using CCIPCA and IPCA for Face Recognition

World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2009

Traditional principal components analysis (PCA) techniques for face recognition are based on batc... more Traditional principal components analysis (PCA) techniques for face recognition are based on batch-mode training using a pre-available image set. Real world applications require that the training set be dynamic of evolving nature where within the framework of continuous learning, new training images are continuously added to the original set; this would trigger a costly continuous re-computation of the eigen space representation via repeating an entire batch-based training that includes the old and new images. Incremental PCA methods allow adding new images and updating the PCA representation. In this paper, two incremental PCA approaches, CCIPCA and IPCA, are examined and compared. Besides, different learning and testing strategies are proposed and applied to the two algorithms. The results suggest that batch PCA is inferior to both incremental approaches, and that all CCIPCAs are practically equivalent.

Research paper thumbnail of Towards A Secure E-Health System for Public Healthcare Sector in Egypt Using HL7 . (Dept. A)

N Egypt, the physician in public clinics deals with a huge number of patients. According to a res... more N Egypt, the physician in public clinics deals with a huge number of patients. According to a research done by World Bank in 2018 [1], the number of physicians per thousand patients is 0.5. This makes it very difficult for physicians to manage and follow up with patients on a paper basis or in separate islands. The availability and feasibility to reach patients’ medical records wherever and whenever it is needed is a key issue to enhance healthcare. The author in [2] highlighted that patients’ satisfaction is a key factor to a successful health system. Many elements contribute

Research paper thumbnail of An improved steganalysis approach for breaking the F5 algorithm

WSEAS Transactions on Computers archive, 2008

In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks ... more In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm using JPEG digital images. The key idea is related to the selection of an "optimal" value of β (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of β for 64 shifting steps worked on an image, an optimal β is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original one. Both algorithms were tested and compared using two sets of test images. The first set uses reference test data of 20 grayscale images [1], and the second uses 432 images created by manipulating 12 images for various image parameters: two sizes (300×400 and 150×2000), six JPEG old quality factors (50, 60, 70, 80, 90, 100), and 3 message...

Research paper thumbnail of Face recognition using principle components and linear discriminant analysis

Face recognition has recently received significant attention as one of the challenging and promis... more Face recognition has recently received significant attention as one of the challenging and promising fields of computer vision and pattern recognition. It plays a significant role in many security and forensic applications such as person authentication in access control systems and person identification in real time video surveillance systems. This paper studies two appearance-based approaches for feature extraction and dimension reduction, namely, Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA). Numerical experiments were carried out on the ORL face database and many parameters were investigated, this included the effect of changing the number of training images, scaling factor, and the effect of feature vector length on the recognition rate. Classification is performed using the minimum Euclidean distance. The results suggest that the effect of increasing the number of training images has more significance on the recognition rate than changing the image ...

Research paper thumbnail of Visual Cryptography Schemes: A Comprehensive Survey

ryptography is study of transforming information in order to make it secure from unintended recip... more ryptography is study of transforming information in order to make it secure from unintended recipients. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts any information [picture, printed text, etc] such that decryption can be performed using human visual system. The goal of this survey paper is to give the readers an overview of the basic visual cryptography schemes constructions, as well as the new techniques derived from VCS. We also review some applications that take advantage of such secure schemes. KeywordsVisual cryptography schemes (VCS), Extended Visual Cryptography (EVC), Universal Share, Contrast,

Research paper thumbnail of Face Detection and Count Estimates in Surveillance Color Images

Face detection has various applications in many areas, an important example of which is security-... more Face detection has various applications in many areas, an important example of which is security-related surveillance in confined areas. Once an image is analyzed for faces detection, the faces in the image are tallied. In this paper, color segmentation is used as a first step in the face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to constraints for ...

Research paper thumbnail of A DCT-Based Secure JPEG Image Authentication Scheme

The challenge in the case of image authentication is that in many cases images need to be subject... more The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting. Keywords—Authentication, DCT, JPEG, Watermarking.

Research paper thumbnail of Automatic human face counting in digital color images

Automatic human face detection is considered as the initial process of any fully automatic system... more Automatic human face detection is considered as the initial process of any fully automatic system that analyzes the information contained in human faces (e.g., identity, gender, expression, age, race and pose). In this paper, color segmentation is used as a first step in the human face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to constraints for rejecting non-face blobs. The system was implemented and validated for images with different formats, sizes, number of people, and complexity of the image background.

Research paper thumbnail of Safeguarding images over insecure channel using master key visual cryptopgraphy

Ain Shams Engineering Journal

Abstract Sharing secrets and safeguarding them while being sent over insecure channel is a crucia... more Abstract Sharing secrets and safeguarding them while being sent over insecure channel is a crucial matter. Visual Cryptography still has the strong potential to secure this critical issue. In this paper, a new master key (n,n) visual cryptography scheme is proposed. The novelty of the proposed scheme is the generation of the master key using Station-to-Station Diffie Hellman algorithm. Moreover, one or more hierarchical shares could be generated for each secret image depending on the degree of security required. The performance of the shares generation technique is compared to others where it proves to be more robust to attacks. The algorithm satisfies all the basics of security: confidentiality, integrity and availability. This was evaluated by different tests like histograms, and entropy. Its security was analyzed against other vulnerabilities by evaluating the effect of man in middle attack and Evesdropping. Experimental results demonstrate that the scheme is highly secure.

Research paper thumbnail of Improved dialect recognition for colloquial Arabic speakers

2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2016

This article proposes a gender and geographical origin recognition system for Arabic speakers bas... more This article proposes a gender and geographical origin recognition system for Arabic speakers based on the dialect and accent characteristics. We demonstrate that the speaker gender and nationality can be determined from colloquial Arabic speech and recommend that this system can be integrated to more complex biometric applications. The acoustic features of our proposed dataset used to identify the speaker's dialect and accent, are extracted using Mel Frequency Cepstral Coefficients (MFCC) and Relative Spectral Analysis (RASTA) techniques. We compare results of classification based on Gaussian Mixture Model with Universal Background Model (GMM-UBM) and Identity Vector (I-vector) classifiers implemented using the MSR Identity Toolbox, which is a MATLAB toolbox for speaker-recognition research from Microsoft. The results show a significant decrease of equal error rate (EER) when recognizing dialect or accent based on gender. In addition, feature fusion of RASTA and MFCC is used to enhance the EER. Results show a 9.8% enhancement in EER over using the RASTA features only.

Research paper thumbnail of A practical, secure, and auditable e-voting system

Journal of Information Security and Applications

Research paper thumbnail of Automatic human face counting in digital color images

Abstract Automatic human face detection is considered as the initial process of any fully automat... more Abstract Automatic human face detection is considered as the initial process of any fully automatic system that analyzes the information contained in human faces (eg, identity, gender, expression, age, race and pose). In this paper, color segmentation is used as a first step in the human face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to ...

Research paper thumbnail of A Survey on Blockchain in E-Government Services: Status and Challenges

arXiv (Cornell University), Feb 4, 2024

Research paper thumbnail of Image Security With Different Techniques Of Cryptography And Coding: A Survey

IOSR Journal of Computer Engineering, 2014

Research paper thumbnail of E-Health in Egypt

Proceedings of the 5th International Conference on Digital Health 2015 - DH '15, 2015

E-health is defined as the use of information and communications technologies (ICT) in supporting... more E-health is defined as the use of information and communications technologies (ICT) in supporting health and health-related fields. The goal of this review is to survey efforts and accomplishments performed on e-health systems in Egypt, assess their potential impact, and guide future implementations and evaluations. The review shows that Egypt has still a long way to go in realizing a fully integrated efficient e-health system, but there is an undeniable hope that it has started on the long tedious journey towards e-health system.

Research paper thumbnail of Combination of Hybrid Chaotic Encryption and LDPC for Secure Transmission of Images over Wireless Networks

International Journal of Image, Graphics and Signal Processing, 2014

Research paper thumbnail of On the development of electronic voting: a survey

Voting is a fundamental decision making instrument in any consensus-based society and democracy d... more Voting is a fundamental decision making instrument in any consensus-based society and democracy depends on the proper administration of popular elections. In any election, there exists a set of requirements among which voters should receive assurance that their intent was correctly captured and that all eligible votes were correctly tallied. On the other hand, the election system as a whole should ensure that voter coercion is unlikely. These conflicting requirements present a significant challenge: how can voters receive enough assurance to trust the election result, but not so much that they can prove to a potential coercer how they voted. The challenge of changing the traditional paper based voting methods used in many developing countries into electronic voting raises a set of functional and constitutional requirements. These requirements are governed by the country in which they operate and are usually not limited to privacy, authentication, fairness, transparency, integrity an...

Research paper thumbnail of Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm

People often transmit digital images over the internet and JPEG is one of the most common used fo... more People often transmit digital images over the internet and JPEG is one of the most common used formats. Steganography is the art and science of hiding communication; the information hiding process thus uses an image as a cover medium to embed a hidden message. Steganalysis is the inverse process of trying to identify the existence of hidden message in a cover image. In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm. The key idea is related to the selection of an "optimal" value of β (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of β for 64 shifting steps worked on an image, an optimal β is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original...

Research paper thumbnail of Applications of Chaotic Maps and Coding for Secure Transmission of Images over Wireless Channels

In this paper we present the applications of image encryption techniques and channel coding techn... more In this paper we present the applications of image encryption techniques and channel coding techniques, to design scheme effective for secure image transmission over wireless channels, we present three proposed scheme as follow: First scheme apply image encryption by a combination of hybrid chaotic maps using Baker map and our proposed Hénon chaotic map 3 in three different modes of operations, beside using fractional Fourier transform (FRFT). Second image encryption scheme is combine the main advantages of FRFT, Arnold cat map for confusion and our proposed Hénon chaotic map 3 for diffusion. Third scheme based on combination of hybrid chaotic encryption and low density parity check (LDPC) to secure transmission of image over wireless channel. Our proposed scheme improve throughput. The proposed scheme enhanced the performance parameters and achieved both security and reliability of image transmission over wireless channels.

Research paper thumbnail of An Improved SIFT-PCA-Based Copy-Move Image Forgery Detection Method

International Journal of Advanced Research in Computer Science and Electronics Engineering, 2017

Copy–move image tampering is one of the most frequently tampering types that contaminate images a... more Copy–move image tampering is one of the most frequently tampering types that contaminate images authenticity due to its ease. Tampering detection becomes more difficult when the tampered parts are subjected to post operations like scaling, rotation, compression or noise. In this paper, a blind copy-move tampering detection and localization method is proposed. Its novelty lies in the combination of SIFT, PCA and DBSCAN techniques. The proposed method shows its potential to disclose and localize tampered regions of different sizes and shapes. Furthermore, our method requires no prior information about the image or the manipulation operations carried on it. A comparative analysis between the proposed method and other tampering detection methods is evaluated based on various performance measures. Our experimental results show that the proposed method outperforms the previous reported techniques and is quite reliable in copy-move tampering detection and localization.

Research paper thumbnail of Evolutionary Eigenspace Learning using CCIPCA and IPCA for Face Recognition

World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2009

Traditional principal components analysis (PCA) techniques for face recognition are based on batc... more Traditional principal components analysis (PCA) techniques for face recognition are based on batch-mode training using a pre-available image set. Real world applications require that the training set be dynamic of evolving nature where within the framework of continuous learning, new training images are continuously added to the original set; this would trigger a costly continuous re-computation of the eigen space representation via repeating an entire batch-based training that includes the old and new images. Incremental PCA methods allow adding new images and updating the PCA representation. In this paper, two incremental PCA approaches, CCIPCA and IPCA, are examined and compared. Besides, different learning and testing strategies are proposed and applied to the two algorithms. The results suggest that batch PCA is inferior to both incremental approaches, and that all CCIPCAs are practically equivalent.

Research paper thumbnail of Towards A Secure E-Health System for Public Healthcare Sector in Egypt Using HL7 . (Dept. A)

N Egypt, the physician in public clinics deals with a huge number of patients. According to a res... more N Egypt, the physician in public clinics deals with a huge number of patients. According to a research done by World Bank in 2018 [1], the number of physicians per thousand patients is 0.5. This makes it very difficult for physicians to manage and follow up with patients on a paper basis or in separate islands. The availability and feasibility to reach patients’ medical records wherever and whenever it is needed is a key issue to enhance healthcare. The author in [2] highlighted that patients’ satisfaction is a key factor to a successful health system. Many elements contribute

Research paper thumbnail of An improved steganalysis approach for breaking the F5 algorithm

WSEAS Transactions on Computers archive, 2008

In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks ... more In this paper, we present an enhancement to the steganalysis algorithm that successfully attacks F5 steganographic algorithm using JPEG digital images. The key idea is related to the selection of an "optimal" value of β (the probability that a non-zero AC coefficient will be modified) for the image under consideration. Rather than averaging the values of β for 64 shifting steps worked on an image, an optimal β is determined that corresponds to the shift having minimal distance E from the double compression removal step. Numerical experiments were carried out to validate the proposed enhanced algorithm and compare it against the original one. Both algorithms were tested and compared using two sets of test images. The first set uses reference test data of 20 grayscale images [1], and the second uses 432 images created by manipulating 12 images for various image parameters: two sizes (300×400 and 150×2000), six JPEG old quality factors (50, 60, 70, 80, 90, 100), and 3 message...

Research paper thumbnail of Face recognition using principle components and linear discriminant analysis

Face recognition has recently received significant attention as one of the challenging and promis... more Face recognition has recently received significant attention as one of the challenging and promising fields of computer vision and pattern recognition. It plays a significant role in many security and forensic applications such as person authentication in access control systems and person identification in real time video surveillance systems. This paper studies two appearance-based approaches for feature extraction and dimension reduction, namely, Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA). Numerical experiments were carried out on the ORL face database and many parameters were investigated, this included the effect of changing the number of training images, scaling factor, and the effect of feature vector length on the recognition rate. Classification is performed using the minimum Euclidean distance. The results suggest that the effect of increasing the number of training images has more significance on the recognition rate than changing the image ...

Research paper thumbnail of Visual Cryptography Schemes: A Comprehensive Survey

ryptography is study of transforming information in order to make it secure from unintended recip... more ryptography is study of transforming information in order to make it secure from unintended recipients. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts any information [picture, printed text, etc] such that decryption can be performed using human visual system. The goal of this survey paper is to give the readers an overview of the basic visual cryptography schemes constructions, as well as the new techniques derived from VCS. We also review some applications that take advantage of such secure schemes. KeywordsVisual cryptography schemes (VCS), Extended Visual Cryptography (EVC), Universal Share, Contrast,

Research paper thumbnail of Face Detection and Count Estimates in Surveillance Color Images

Face detection has various applications in many areas, an important example of which is security-... more Face detection has various applications in many areas, an important example of which is security-related surveillance in confined areas. Once an image is analyzed for faces detection, the faces in the image are tallied. In this paper, color segmentation is used as a first step in the face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to constraints for ...

Research paper thumbnail of A DCT-Based Secure JPEG Image Authentication Scheme

The challenge in the case of image authentication is that in many cases images need to be subject... more The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting. Keywords—Authentication, DCT, JPEG, Watermarking.

Research paper thumbnail of Automatic human face counting in digital color images

Automatic human face detection is considered as the initial process of any fully automatic system... more Automatic human face detection is considered as the initial process of any fully automatic system that analyzes the information contained in human faces (e.g., identity, gender, expression, age, race and pose). In this paper, color segmentation is used as a first step in the human face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to constraints for rejecting non-face blobs. The system was implemented and validated for images with different formats, sizes, number of people, and complexity of the image background.

Research paper thumbnail of Safeguarding images over insecure channel using master key visual cryptopgraphy

Ain Shams Engineering Journal

Abstract Sharing secrets and safeguarding them while being sent over insecure channel is a crucia... more Abstract Sharing secrets and safeguarding them while being sent over insecure channel is a crucial matter. Visual Cryptography still has the strong potential to secure this critical issue. In this paper, a new master key (n,n) visual cryptography scheme is proposed. The novelty of the proposed scheme is the generation of the master key using Station-to-Station Diffie Hellman algorithm. Moreover, one or more hierarchical shares could be generated for each secret image depending on the degree of security required. The performance of the shares generation technique is compared to others where it proves to be more robust to attacks. The algorithm satisfies all the basics of security: confidentiality, integrity and availability. This was evaluated by different tests like histograms, and entropy. Its security was analyzed against other vulnerabilities by evaluating the effect of man in middle attack and Evesdropping. Experimental results demonstrate that the scheme is highly secure.

Research paper thumbnail of Improved dialect recognition for colloquial Arabic speakers

2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2016

This article proposes a gender and geographical origin recognition system for Arabic speakers bas... more This article proposes a gender and geographical origin recognition system for Arabic speakers based on the dialect and accent characteristics. We demonstrate that the speaker gender and nationality can be determined from colloquial Arabic speech and recommend that this system can be integrated to more complex biometric applications. The acoustic features of our proposed dataset used to identify the speaker's dialect and accent, are extracted using Mel Frequency Cepstral Coefficients (MFCC) and Relative Spectral Analysis (RASTA) techniques. We compare results of classification based on Gaussian Mixture Model with Universal Background Model (GMM-UBM) and Identity Vector (I-vector) classifiers implemented using the MSR Identity Toolbox, which is a MATLAB toolbox for speaker-recognition research from Microsoft. The results show a significant decrease of equal error rate (EER) when recognizing dialect or accent based on gender. In addition, feature fusion of RASTA and MFCC is used to enhance the EER. Results show a 9.8% enhancement in EER over using the RASTA features only.

Research paper thumbnail of A practical, secure, and auditable e-voting system

Journal of Information Security and Applications

Research paper thumbnail of Automatic human face counting in digital color images

Abstract Automatic human face detection is considered as the initial process of any fully automat... more Abstract Automatic human face detection is considered as the initial process of any fully automatic system that analyzes the information contained in human faces (eg, identity, gender, expression, age, race and pose). In this paper, color segmentation is used as a first step in the human face detection process followed by grouping likely face regions into clusters of connected pixels. Median filtering is then performed to eliminate the small clusters and the resulting blobs are matched against a face pattern (ellipse) subjected to ...