Mohammed Khalil | King Saud University (original) (raw)
Uploads
Papers by Mohammed Khalil
Sensors (Basel, Switzerland), Jan 31, 2016
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WS... more The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is pres...
BioMedical Engineering OnLine, 2015
The Scientific World Journal, 2014
This paper presents a novel watermarking method to facilitate the authentication and detection of... more This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.
BioMedical Engineering OnLine, 2016
… Journal of Physical …, Jan 1, 2010
… (FutureTech), Jan 1, 2010
The International Arab …, Jan 1, 2008
Digital Signal Processing, Jan 1, 2010
Proceedings of The 4th …, Jan 1, 2008
Anti-Counterfeiting, Security and …
2009 Second International …, Jan 1, 2009
Sensors (Basel, Switzerland), Jan 31, 2016
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WS... more The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is pres...
BioMedical Engineering OnLine, 2015
The Scientific World Journal, 2014
This paper presents a novel watermarking method to facilitate the authentication and detection of... more This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.
BioMedical Engineering OnLine, 2016
… Journal of Physical …, Jan 1, 2010
… (FutureTech), Jan 1, 2010
The International Arab …, Jan 1, 2008
Digital Signal Processing, Jan 1, 2010
Proceedings of The 4th …, Jan 1, 2008
Anti-Counterfeiting, Security and …
2009 Second International …, Jan 1, 2009