Mohammed Khalil | King Saud University (original) (raw)

Uploads

Papers by Mohammed Khalil

Research paper thumbnail of Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

Sensors (Basel, Switzerland), Jan 31, 2016

The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WS... more The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is pres...

Research paper thumbnail of Reference point detection for camera-based fingerprint image based on wavelet transformation

BioMedical Engineering OnLine, 2015

Research paper thumbnail of Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

The Scientific World Journal, 2014

This paper presents a novel watermarking method to facilitate the authentication and detection of... more This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Research paper thumbnail of Erratum to: Reference point detection for camera-based fingerprint image based on wavelet transformation

BioMedical Engineering OnLine, 2016

Research paper thumbnail of Fingerprint Classification Using PCA, LDA, L-LDA and BPN

Research paper thumbnail of Singular points detection using fingerprint orientation field reliability

… Journal of Physical …, Jan 1, 2010

Research paper thumbnail of Fingerprint Verification Based on Statistical Analysis

… (FutureTech), Jan 1, 2010

Research paper thumbnail of Converting Fingerprint Local Features to Public Key Using Fuzzy Extractor

The International Arab …, Jan 1, 2008

Research paper thumbnail of Fingerprint verification using statistical descriptors

Digital Signal Processing, Jan 1, 2010

Research paper thumbnail of Extracting Fingerprint Local Features

Proceedings of The 4th …, Jan 1, 2008

Research paper thumbnail of Statistical authentication of fingerprints

Research paper thumbnail of Co-occurrence matrix features for fingerprint verification

Anti-Counterfeiting, Security and …

Research paper thumbnail of Fingerprint verification using fingerprint texture

Research paper thumbnail of Fingerprint Verification Using the Texture of Fingerprint Image

2009 Second International …, Jan 1, 2009

Research paper thumbnail of Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

Sensors (Basel, Switzerland), Jan 31, 2016

The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WS... more The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is pres...

Research paper thumbnail of Reference point detection for camera-based fingerprint image based on wavelet transformation

BioMedical Engineering OnLine, 2015

Research paper thumbnail of Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

The Scientific World Journal, 2014

This paper presents a novel watermarking method to facilitate the authentication and detection of... more This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Research paper thumbnail of Erratum to: Reference point detection for camera-based fingerprint image based on wavelet transformation

BioMedical Engineering OnLine, 2016

Research paper thumbnail of Fingerprint Classification Using PCA, LDA, L-LDA and BPN

Research paper thumbnail of Singular points detection using fingerprint orientation field reliability

… Journal of Physical …, Jan 1, 2010

Research paper thumbnail of Fingerprint Verification Based on Statistical Analysis

… (FutureTech), Jan 1, 2010

Research paper thumbnail of Converting Fingerprint Local Features to Public Key Using Fuzzy Extractor

The International Arab …, Jan 1, 2008

Research paper thumbnail of Fingerprint verification using statistical descriptors

Digital Signal Processing, Jan 1, 2010

Research paper thumbnail of Extracting Fingerprint Local Features

Proceedings of The 4th …, Jan 1, 2008

Research paper thumbnail of Statistical authentication of fingerprints

Research paper thumbnail of Co-occurrence matrix features for fingerprint verification

Anti-Counterfeiting, Security and …

Research paper thumbnail of Fingerprint verification using fingerprint texture

Research paper thumbnail of Fingerprint Verification Using the Texture of Fingerprint Image

2009 Second International …, Jan 1, 2009

Log In