12 results on '"Basma Abd El-Rahiem"'
Search Results
2. An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream
- Author
-
Abdullah M. Iliyasu, Fathi E. Abd El Samie, Ahmed Sedik, Basma Abd El-Rahiem, and Mohamed Amin
- Subjects
Scheme (programming language) ,Authentication ,General Computer Science ,Exploit ,Biometrics ,Cancellable biometric system ,business.industry ,Computer science ,Deep learning ,Fingerprint (computing) ,Deep dream ,Computational intelligence ,Machine learning ,computer.software_genre ,Identification (information) ,Artificial intelligence ,Fusion ,business ,Deep learning model ,computer ,Original Research ,Multi-biometrics ,computer.programming_language - Abstract
Today, biometrics are the preferred technologies for person identification, authentication, and verification cutting across different applications and industries. Sadly, this ubiquity has invigorated criminal efforts aimed at violating the integrity of these modalities. Our study presents a multi-biometric cancellable scheme (MBCS) that exploits the proven utility of deep learning models to fuse multi-exposure fingerprint, finger vein, and iris biometrics by using an Inspection V3 pre-trained model to generate an aggregate tamper-proof cancellable template. To validate our MBCS, we employed an extensive evaluation including visual, quantitative, and qualitative assessments as well as complexity analysis where average outcomes of 99.158%, 24.523 dB, 0.079, 0.909, 59.582 and 23.627 were recorded for NPCR, PSNR, SSIM, UIQ, SD and UACI respectively. These quantitative outcomes indicate that the proposed scheme compares favourably against state-of-the-art methods reported in the literature. To further improve the utility of the proposed MBCS, we are exploring its refinement to facilitate generation of cancellable templates for real-time biometric applications in person authentication at airports, banks, etc.
- Published
- 2021
- Full Text
- View/download PDF
3. Multimodal biometric authentication based on deep fusion of electrocardiogram (ECG) and finger vein
- Author
-
Mohamed Amin, Basma Abd El-Rahiem, and Fathi E. Abd El-Samie
- Subjects
Authentication ,Biometrics ,Computer Networks and Communications ,business.industry ,Computer science ,Feature vector ,Feature extraction ,Pattern recognition ,Convolutional neural network ,Support vector machine ,Naive Bayes classifier ,Hardware and Architecture ,Feature (computer vision) ,Media Technology ,Artificial intelligence ,business ,Software ,Information Systems - Abstract
Biometric identification depends on the statistical analysis of the unique physical and behavioral characteristics of individuals. However, a unimodal biometric system is susceptible to different attacks such as spoof attacks. To overcome these limitations, we propose a multimodal biometric authentication system based on deep fusion of electrocardiogram (ECG) and finger vein. The proposed system has three main components, which are biometric pre-processing, deep feature extraction, and authentication. During the pre-processing, normalization and filtering techniques are adapted for each biometric. In the feature extraction process, the features are extracted using a proposed deep Convolutional Neural Network (CNN) model. Then, the authentication process is performed on the extracted features using five well-known machine learning classifiers: Support Vector Machine (SVM), K-Nearest Neighbors (KNNs), Random Forest (RF), Naive Bayes (NB), and Artificial Neural Network (ANN). In addition, to represent the deep features in a low-dimensional feature space and speed up the authentication task, we adopt Multi-Canonical Correlation Analysis (MCCA). We combine the two biometric systems based on ECG and finger vein into a single multimodal biometric system using feature and score fusion. The performance of the proposed system is tested on two finger vein (TW finger vein and VeinPolyU finger vein) databases and two ECG (MWM-HIT and ECG-ID) databases. Experimental results reveal improvement in terms of authentication performance with Equal Error Rates (EERs) of 0.12% and 1.40% using feature fusion and score fusion, respectively. Furthermore, the authentication with the proposed multimodal system using MCCA feature fusion with a KNN classifier shows an increase of accuracy by an average of 10% compared with those of other machine learning algorithms. Therefore, the proposed biometric system is effective in performing secure authentication and assisting the stakeholders in making accurate authentication of users.
- Published
- 2021
- Full Text
- View/download PDF
4. An efficient deep learning model for classification of thermal face images
- Author
-
Basma Abd El-Rahiem, Oh-Young Song, Mohamed Amin, Ashraf A. M. Khalaf, Ahmed Sedik, Ghada M. El Banby, Fathi E. Abd El-Samie, and Hani M. Ibrahem
- Subjects
business.industry ,Computer science ,Deep learning ,General Decision Sciences ,020207 software engineering ,02 engineering and technology ,Facial recognition system ,Management of Technology and Innovation ,Face (geometry) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Information Systems - Abstract
PurposeThe objective of this paper is to perform infrared (IR) face recognition efficiently with convolutional neural networks (CNNs). The proposed model in this paper has several advantages such as the automatic feature extraction using convolutional and pooling layers and the ability to distinguish between faces without visual details.Design/methodology/approachA model which comprises five convolutional layers in addition to five max-pooling layers is introduced for the recognition of IR faces.FindingsThe experimental results and analysis reveal high recognition rates of IR faces with the proposed model.Originality/valueA designed CNN model is presented for IR face recognition. Both the feature extraction and classification tasks are incorporated into this model. The problems of low contrast and absence of details in IR images are overcome with the proposed model. The recognition accuracy reaches 100% in experiments on the Terravic Facial IR Database (TFIRDB).
- Published
- 2020
- Full Text
- View/download PDF
5. A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG Signals
- Author
-
Basma Abd El-Rahiem and Mohamed Hammad
- Subjects
Authentication ,Biometrics ,business.industry ,Computer science ,Deep learning ,computer.software_genre ,Support vector machine ,Feature (computer vision) ,Classifier (linguistics) ,Artificial intelligence ,Data mining ,Precision and recall ,business ,computer ,Wearable technology - Abstract
Recently, the interest in using wearable devices or the internet of things (IoT)-based biometric authentication, especially IoT-based electrocardiogram (ECG) has increased. ECG-based biometric authentication has received great attention as a next-generation promising technique and been implemented with various approaches to improve the authentication performance for the past few decades. However, ECG signals of a person may vary according to his/her physical states, or health conditions, possibly leading to authentication failure in some cases. Therefore, it is essential to design a robust method that handles the ECG subject variability for accurate authentication. In this Chapter, we proposed an efficient and robust authentication system based on ECG. In this study, we propose a novel deep learning fusion framework using the transfer learning concept where the deep features extracted from different models are combined into a single feature which are then fed to a custom classifier such as a support vector machine (SVM) for authentication. Cross-validation studies are used to assess the performance of the proposed authentication system using two public databases. Evaluation results show that the performance of our fusion model achieved an authentication accuracy of 99.4% with a high level of precision and recall. Finally, the results show that the proposed system is suitable for real-time applications.
- Published
- 2021
- Full Text
- View/download PDF
6. Image Steganography
- Author
-
Renjith V. Ravi, Sana Parveen K, Basma Abd El-Rahiem, and Mangesh M. Ghonge
- Subjects
Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0202 electrical engineering, electronic engineering, information engineering ,020207 software engineering ,020201 artificial intelligence & image processing ,Computer vision ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Image steganography ,Artificial intelligence ,business - Abstract
Steganography is the process used hide the existence of information during transmission. Cover mediums like text, image, audio, and video protocols are used to hide the secret information. This process helps to provide secret communication between two parties. As data is unknown, it is challenging to attract the attention of any third parties. Therefore, steganography becomes the best and most secure method for data transmission. Digital images are the most common cover media or carriers in steganographic processes, where the secret payload is embedded into images. Several techniques are coming under image steganography, and there includes a different method to ensure the secrecy of messages. This chapter gives an overview of the different commonly used techniques in this area and the latest existing image steganography methods and the comparison of techniques.
- Published
- 2021
- Full Text
- View/download PDF
7. Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment
- Author
-
Hany S. Khalifa, Hoshang Kolivand, Bassem Abd-El-Atty, Syam Sankar, Ahmed A. Abd El-Latif, Basma Abd El-Rahiem, and Ahmad Alanezi
- Subjects
QA75 ,Science (General) ,Article Subject ,Computer Networks and Communications ,Computer science ,Chaotic ,Data security ,Cryptography ,Cloud computing ,02 engineering and technology ,Encryption ,QA76 ,Q1-390 ,Digital image ,Smart city ,0202 electrical engineering, electronic engineering, information engineering ,T1-995 ,Cryptosystem ,Technology (General) ,Computer Science::Cryptography and Security ,business.industry ,020206 networking & telecommunications ,Computer engineering ,ComputerSystemsOrganization_MISCELLANEOUS ,020201 artificial intelligence & image processing ,business ,Information Systems - Abstract
Data security plays a significant role in data transfer in cloud-based smart cities. Chaotic maps are commonly used in designing modern cryptographic applications, in which one-dimensional (1D) chaotic systems are widely used due to their simple design and low computational complexity. However, 1D chaotic maps suffer from different kinds of attacks because of their chaotic discontinuous ranges and small key-space. To own the benefits of 1D chaotic maps and avoid their drawbacks, the cascading of two integrated 1D chaotic systems has been utilized. In this paper, we report an image cryptosystem for data transfer in cloud-based smart cities using the cascading of Logistic-Chebyshev and Logistic-Sine maps. Logistic-Sine map has been utilized to permute the plain image, and Logistic-Chebyshev map has been used to substitute the permuted image, while the cascading of both integrated maps has been utilized in performing XOR procedure on the substituted image. The security analyses of the suggested approach prove that the encryption mechanism has good efficiency as well as lower encryption time compared with other related algorithms.
- Published
- 2021
- Full Text
- View/download PDF
8. Deploying Machine and Deep Learning Models for Efficient Data-Augmented Detection of COVID-19 Infections
- Author
-
Abdullah M. Iliyasu, Mohammed Elsayed Abdel Samea, Mohamed Hammad, Basma Abd El-Rahiem, Jialiang Peng, Ahmed Sedik, Asmaa Abdel-Raheem, Fathi E. Abd El-Samie, and Ahmed A. Abd El-Latif
- Subjects
Corona virus ,Computer science ,Reliability (computer networking) ,Pneumonia, Viral ,lcsh:QR1-502 ,02 engineering and technology ,LSTM networks ,Machine learning ,computer.software_genre ,Convolutional neural network ,lcsh:Microbiology ,Article ,Machine Learning ,Betacoronavirus ,Virology ,0202 electrical engineering, electronic engineering, information engineering ,Humans ,Isolation (database systems) ,Pandemics ,Learnability ,business.industry ,SARS-CoV-2 ,Social distance ,Deep learning ,COVID-19 ,deep learning ,020206 networking & telecommunications ,image processing ,Identification (information) ,Infectious Diseases ,ROC Curve ,020201 artificial intelligence & image processing ,Artificial intelligence ,Unavailability ,business ,Coronavirus Infections ,Tomography, X-Ray Computed ,computer ,CNN - Abstract
This generation faces existential threats because of the global assault of the novel Corona virus 2019 (i.e., COVID-19). With more than thirteen million infected and nearly 600000 fatalities in 188 countries/regions, COVID-19 is the worst calamity since the World War II. These misfortunes are traced to various reasons, including late detection of latent or asymptomatic carriers, migration, and inadequate isolation of infected people. This makes detection, containment, and mitigation global priorities to contain exposure via quarantine, lockdowns, work/stay at home, and social distancing that are focused on &ldquo, flattening the curve&rdquo, While medical and healthcare givers are at the frontline in the battle against COVID-19, it is a crusade for all of humanity. Meanwhile, machine and deep learning models have been revolutionary across numerous domains and applications whose potency have been exploited to birth numerous state-of-the-art technologies utilised in disease detection, diagnoses, and treatment. Despite these potentials, machine and, particularly, deep learning models are data sensitive, because their effectiveness depends on availability and reliability of data. The unavailability of such data hinders efforts of engineers and computer scientists to fully contribute to the ongoing assault against COVID-19. Faced with a calamity on one side and absence of reliable data on the other, this study presents two data-augmentation models to enhance learnability of the Convolutional Neural Network (CNN) and the Convolutional Long Short-Term Memory (ConvLSTM)-based deep learning models (DADLMs) and, by doing so, boost the accuracy of COVID-19 detection. Experimental results reveal improvement in terms of accuracy of detection, logarithmic loss, and testing time relative to DLMs devoid of such data augmentation. Furthermore, average increases of 4% to 11% in COVID-19 detection accuracy are reported in favour of the proposed data-augmented deep learning models relative to the machine learning techniques. Therefore, the proposed algorithm is effective in performing a rapid and consistent Corona virus diagnosis that is primarily aimed at assisting clinicians in making accurate identification of the virus.
- Published
- 2020
9. Quaternion and multiple chaotic systems based pseudo-random number generator
- Author
-
Bassem Abd-El-Atty, Li Li, Sherif Elseuofi, Basma Abd El-Rahiem, and Ahmed A. Abd El-Latif
- Subjects
Pseudorandom number generator ,business.industry ,Chaotic systems ,NIST ,Cryptography ,Image processing ,Space (mathematics) ,business ,Quaternion ,Encryption ,Algorithm - Abstract
Quaternions are widely used in physics, geometry and image processing, which are hyper-complex numbers applied in three-dimensional space. In this paper, we utilize the benefits of quaternions to present a new PRNG (pseudo-random number generator) algorithm using quaternions and three chaotic systems. The generated sequences yield to a long period and remedy the periodicity problem for cryptographic purposes. The performance of the proposed PRNG method is estimated through several NIST suit statistical analyses. The results demonstrate that the proposed PRNG algorithm has significant qualities for viable applications in security purposes.
- Published
- 2019
- Full Text
- View/download PDF
10. An Efficient Deep Convolutional Neural Network for Visual Image Classification
- Author
-
Fathi E. Abd El-Samie, Hani Abd El-Rahaman, Basma Abd El-Rahiem, Mohamed Amin, Omar Reyad, and Muhammad Atta Othman Ahmed
- Subjects
Contextual image classification ,Computer science ,business.industry ,Deep learning ,Process (computing) ,Graphics processing unit ,Pattern recognition ,Construct (python library) ,Artificial intelligence ,business ,Convolutional neural network ,Dropout (neural networks) ,Convolution - Abstract
Such a hot open issue in the area of computer vision is the classification of visual images especially in Internet of Things (IoT) and remote mid-band and high-band based connections. In this paper, we propose a robust and efficient taxonomy framework. The proposed model utilizes the well-known convolutional neural network composites to construct a robust Visual Image Classification Network (VICNet). The VICNet consists of three convolutional layers, four Relu/Leaky Relu activation layers, three max-pooling layers and only two fully connected layers for extracting expected input image features. To make the training process faster, we used non-saturating neurons with a very efficient Graphics Processing Unit (GPU) implementation for the convolution operation. To minimize over-fitting issue in the fully-connected layers, we utilized a recently-developed regularization approach “dropout” with a dropping probability of 50%. The proposed VICNet framework has a high potential capability in the recognition of test images. The experimental and simulations results proven the efficacy of the proposed model.
- Published
- 2019
- Full Text
- View/download PDF
11. Speaker identification based on Radon transform and CNNs in the presence of different types of interference for Robotic Applications
- Author
-
Fathi E. Abd El-Samie, Amira Shafik, Abdullah M. Iliyasu, Ashraf A. M. Khalaf, El-Sayed M. El-Rabaie, Oh-Young Song, Basma Abd El-Rahiem, Ghada M. El Banby, and Ahmed Sedik
- Subjects
010302 applied physics ,Acoustics and Ultrasonics ,Radon transform ,Computer science ,business.industry ,Speech recognition ,Deep learning ,01 natural sciences ,Convolutional neural network ,Robot control ,Robustness (computer science) ,0103 physical sciences ,Benchmark (computing) ,Spectrogram ,Artificial intelligence ,Noise (video) ,business ,010301 acoustics - Abstract
Both automatic speaker identification (ASI) and speech recognition can be utlized now for the control of modern robots. An ASI algorithm can be implemented at a speech interface of the robot to determine the identity of the person allowed to deal with the robot, while speech recognition can be implemented for the interpretation of the order given to the robot. Robustness of the ASI system is a challenging task in the presence of speech degradations such as noise and interference. This study presents a new approach to improve the accuracy of speaker identification in the presence of interference for robot control applications with a convolutional neural network (CNN). First, the speech signal from the speaker is divided into segments, each of which is transformed into a spectrogram, and hence Radon transformation is estimated for this spectrogram. The spectrogram resolves the speech segment into a map of power distribution with both time and frequency. Together, the spectrograms and their Radon transforms are used as inputs to a proposed CNN-based deep learning model. Necessary refinements are undertaken and the resulting optimized “Radon-Deep-Learning Model (RDLM) is compared with a benchmark model. The proposed model consists of six convolutional (CNV) layers followed by six Max. pooling layers, while the benchmark model consists of three CNV layers followed by three Max. pooling layers. Experimental results reveal that the proposed RDLM model achieves a high classification accuracy up to 97.5%, which is more than double the performance reported for some traditional methods that are used for speaker identification.
- Published
- 2021
- Full Text
- View/download PDF
12. Inspection of EEG signals for efficient seizure prediction
- Author
-
Mahmoud A.A. Ali, Heba A. El-Khobby, Basma Abd El-Rahiem, Fathi E. Abd El-Samie, Ghada M. El Banby, Ahmed Sedik, Saleh A. Alshebeili, Turky N. Alotaiby, and Ashraf A. M. Khalaf
- Subjects
010302 applied physics ,Acoustics and Ultrasonics ,medicine.diagnostic_test ,Computer science ,business.industry ,Noise (signal processing) ,Pattern recognition ,Filter (signal processing) ,Electroencephalography ,Perceptron ,01 natural sciences ,Thresholding ,Constant false alarm rate ,0103 physical sciences ,medicine ,Ictal ,Artificial intelligence ,Cluster analysis ,business ,010301 acoustics - Abstract
Epilepsy seizure prediction has become one of the interesting fields that attract researchers to innovate solutions. For epilepsy patients, Electroencephalography (EEG) signals consist of three activities: normal, pre-ictal and ictal. In order to design a prediction model for the ictal state, it is required to distinguish between the activities of EEG signals. This paper presents efficient seizure prediction approaches from EEG signals based on statistical analysis, digital band-limiting filters and artificial intelligence. Band-limiting filters are used to remove out-of-band noise and spurious effects. Then, statistical analysis is adopted for channel selection and seizure prediction based on a thresholding strategy. This statistical analysis depends on amplitude, median, mean, variance and derivative of the EEG signal. The adopted band-limiting filter affects the seizure prediction metrics such as accuracy, prediction time and false alarm rate. The prediction process consists of two phases: training and testing. Both k-means clustering and Multi-Layer Perceptron (MLP) networks are considered for seizure prediction based on artificial intelligence. The proposed approaches can be implemented in a mobile application to give alerts to patients or care givers. The simulation results reveal that the proposed approaches present high performance in terms of accuracy, prediction time and false alarm rate.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.