Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Akram M. Zeki is active.

Publication


Featured researches published by Akram M. Zeki.


international conference for internet technology and secured transactions | 2009

A secure audio steganography approach

Mazdak Zamani; Azizah Abdul Manaf; Rabiah Ahmad; Farhang Jaryani; Hamed Taherdoost; Akram M. Zeki

A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness.


ieee international conference on computer science and information technology | 2009

An approach to improve the robustness of substitution techniques of audio steganography

Mazdak Zamani; Rabiah Ahmad; Azizah Abdul Manaf; Akram M. Zeki

Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.


international conference on information and communication technologies | 2009

Robust audio steganography via genetic algorithm

Mazdak Zamani; Hamed Taherdoost; Azizah Abdul Manaf; Rabiah Ahmad; Akram M. Zeki

Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.


international colloquium on signal processing and its applications | 2013

Properties of digital image watermarking

Mohammad Abdullatif; Akram M. Zeki; Jalel Chebil; Teddy Surya Gunawan

Digital image watermarking techniques have been developed widely in recent years to maintain the broadcasting media and content authentication, broadcast monitoring, copy control, and many other applications. Therefore, many studies have used digital image watermarking to solve these problem. This paper highlights digital image watermarking. It starts with a basic model of digital image watermarking, it discusses the main requirements and applications. Moreover, it reviews some of the techniques and algorithm used in image watermarking. In addition, digital image watermarking attacks are discussed. Lastly, Watermarking evaluation system is described.


international conference on information and communication technology | 2010

Segmentation techniques for online Arabic handwriting Recognition: A survey

Mustafa Ali Abuzaraida; Ahmed M. Zeki; Akram M. Zeki

This paper presents and compares techniques that have been used to segment Arabic handwriting scripts in online recognition systems. Those techniques attempt to segment cursive Arabic words into characters, or segment characters into small strokes that can be recognized via the recognition system. The structure and strategy of those reviewed techniques are explained in this article. The strengths and weaknesses of using these techniques will also be discussed.


information assurance and security | 2009

A Novel Approach for Audio Watermarking

Mazdak Zamani; Azizah Abdul Manaf; Rabiah Ahmad; Akram M. Zeki; Pritheega Magalingam

This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.


international conference on advanced computer science applications and technologies | 2012

Recognition Techniques for Online Arabic Handwriting Recognition Systems

Mustafa Ali Abuzaraida; Akram M. Zeki; Ahmed M. Zeki

Online recognition of Arabic handwritten text has been an on-going research problem for many years. Generally, online text recognition field has been gaining more interest lately due to the increasing popularity of hand-held computers, digital notebooks and advanced cellular phones. However, different techniques have been used to build several online handwritten recognition systems for Arabic text, such as Neural Networks, Hidden Markov Model, Template Matching and others. Most of the researches on online text recognition have divided the recognition system into these three main phases which are preprocessing phase, feature extraction phase and recognition phase which considers as the most important phase and the heart of the whole system. This paper presents and compares techniques that have been used to recognize the Arabic handwriting scripts in online recognition systems. Those techniques attempt to recognize Arabic handwritten words, characters, digits or strokes. The structure and strategy of those reviewed techniques are explained in this article. The strengths and weaknesses of using these techniques will also be discussed.


international conference on information and communication technology | 2013

Problems of writing on digital surfaces in online handwriting recognition systems

Mustafa Ali Abuzaraida; Akram M. Zeki; Ahmed M. Zeki

Nowadays, keyboards and mice are the basic input devices for personal computers. Nevertheless, these devices may not remain as the only way of transmitting electronic data to computers. Other methods may become necessary, particularly with regard to the size of newer mobile devices and the method of transmission. Hand-held computers, mobile technology, for example, present significant opportunities for alternative devices that work in forms smaller than the traditional keyboard and mouse. In addition, the need for more natural human-machine interfaces becomes more important due to computer usage reaches a larger number of people worldwide. However, these new ways of human-machine interfaces have some problems while connecting to the computers. This paper presents and highlights some of these problems in the field of script recognition. This paper also illustrates the used techniques to overcome these matters.


DaEng | 2014

Orthogonal Wavelet Support Vector Machine for Predicting Crude Oil Prices

Haruna Chiroma; Sameem Abdulkareem; Adamau Abubakar; Akram M. Zeki; Mohammed Joda Usman

Previous studies mainly used radial basis, sigmoid, polynomial, linear, and hyperbolic functions as the kernel function for computation in the neurons of conventional support vector machine (CSVM) whereas orthogonal wavelet requires less number of iterations to converge than these listed kernel functions. We proposed an orthogonal wavelet support vector machine (OSVM) model for predicting the monthly prices of West Texas Intermediate crude oil prices. For evaluation purposes, we compared the performance of our results with that of the CSVM, and multilayer perceptron neural network (MLPNN). It was found to perform better than the CSVM, and the MLPNN. Moreover, the number of iterations, and time computational complexity of the OSVM model is less than that of CSVM, and MLPNN. Experimental results suggest that the OSVM is effective, robust, and can efficiently be used for crude oil price prediction. Our proposal has the potentials of advancing the prediction accuracy of crude oil prices, which makes it suitable for building intelligent decision support systems.


international conference on research and innovation in information systems | 2013

Automatic interactive security monitoring system

Akram M. Zeki; Elbara Elnour; Adamu A. Ibrahim; Chiroma Haruna; Sameem Abdulkareem

Over the years an increasing demand for an automated security system begins to emerge. Many applications that help in protecting life and properties are being developed. Most of them are aimed at improving the work of security personnel and security agencies. However, security is a responsibility of everyone not only the security agencies or security personnel alone. This paper present an interactive security monitoring system based on passive infrared motion detection sensor, which will capture the image of any intruding persons and share it to the entire people that are using the system on both Android platform and in an online portal display. The people on the system can communicate with each other and post information to a commonly accessible board in the online system to discuss any issues or to see if anyone recognizes the felons/intruder on the images. Images of interest can then be transmitted to law enforcement authorities. This could be use in anywhere that needs to be protected against intruder. It will be best use in kindergarten, primary school and or in a neighborhood. That is why we call it neighborhood watch security system (NWSS). Preliminaries evaluation indicated an accurate image captured in a real time with an avoidance of false alarm.

Collaboration


Dive into the Akram M. Zeki's collaboration.

Top Co-Authors

Avatar

Adamu Abubakar

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Azizah Abdul Manaf

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Aisha Hassan Abdalla Hashim

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mazdak Zamani

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Shayma Senan

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Othman Omran Khalifa

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azman Yasin

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Rabiah Ahmad

Universiti Teknikal Malaysia Melaka

View shared research outputs
Researchain Logo
Decentralizing Knowledge