Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ali Al-Haj is active.

Publication


Featured researches published by Ali Al-Haj.


Signal Processing | 2008

An improved SVD-based watermarking scheme for protecting rightful ownership

Ahmad A. Mohammad; Ali Al-Haj; Sameer Shaltaf

In this paper, a new SVD-based digital watermarking scheme for ownership protection is proposed. The proposed algorithm solves the problem of false-positive detection. In addition, it enjoys all the advantages of SVD-based schemes. Instead of using a randomly generated Gaussian sequence, a meaningful text message is used. Thus, clarity of the extracted message determines the performance of the algorithm. Analytical and experimental developments show that the proposed algorithm is robust and secure. Comparisons with other algorithms indicate that the proposed algorithm is robust against most common attacks. In particular, the algorithm proved to be extremely robust against geometrical distortion attacks.


International Journal of Applied Science and Engineering | 2003

Fast Discrete Wavelet Transformation Using FPGAs and Distributed Arithmetic

Ali Al-Haj

The discrete wavelet transform has gained the reputation of being a very effective sig- nal analysis tool for many practical applications. However, due to its computation-intensive na- ture, current implementations of the transform fall short of meeting real-time processing re- quirements of most applications. This paper describes a parallel implementation of the discrete wavelet transform and its inverse using high-density field programmable logic devices (FPGAs). The implementation exploits the lookup table-based architecture of Virtex FPGAs, by reformu- lating the wavelet computation in accordance with the distributed arithmetic algorithm. Perform- ance results show that the distributed arithmetic formulation results in a considerable perform- ance gain compared with the conventional arithmetic formulation of the wavelet computation. Finally, we show that the FPGA implementation outperforms alternative software implementa- tions of the discrete wavelet transform.


Journal of Digital Imaging | 2014

Secured Telemedicine Using Region-Based Watermarking with Tamper Localization

Ali Al-Haj; Alaa’ Amer

Medical images exchanged over public networks require a methodology to provide confidentiality for the image, authenticity of the image ownership and source of origin, and image integrity verification. To provide these three security requirements, we propose in this paper a region-based algorithm based on multiple watermarking in the frequency and spatial domains. Confidentiality and authenticity are provided by embedding robust watermarks in the region-of-non-interest (RONI) of the image using a blind scheme in the discrete wavelet transform and singular value decomposition domain (DWT-SVD). On the other hand, integrity is provided by embedding local fragile watermarks in the region-of-interest (ROI) of the image using a reversible scheme in the spatial domain. The integrity provided by the proposed algorithm is implemented on a block-level of the partitioned-image, thus enabling localized detection of tampered regions. The algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization capability, using MRI, Ultrasound, and X-ray gray-scale medical images. Performance results demonstrate the effectiveness of the proposed algorithm in providing the required security services for telemedicine applications.


international conference on innovations in information technology | 2008

Hybrid DWT-SVD video watermarking

Lama Rajab; Tahani Al-Khatib; Ali Al-Haj

Video watermarking is a relatively new technology that has been proposed to solve the problem of illegal manipulation and distribution of digital video. By virtue of this technology, copyright information is embedded in the video data to provide ownership verification. In this paper, we propose an effective, robust, and imperceptible video watermarking algorithm. The effectiveness of algorithm is brought by virtue of applying a cascade of two powerful mathematical transforms; the discrete wavelets transform (DWT) and the singular value decomposition (SVD). Reported experimental results demonstrate the effectiveness of the proposed algorithm.


Iet Information Security | 2015

Crypto-based algorithms for secured medical image transmission

Ali Al-Haj; Gheith A. Abandah; Noor Hussein

Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, crypto-based algorithms and hybrid algorithms. In this study, the authors propose two crypto-based algorithms capable of providing confidentiality, authenticity and integrity services to medical images exchanged in telemedicine applications. Strong cryptographic functions with internally generated symmetric keys and hash codes are used. The advanced encryption standard-Galois counter mode is used with the whirlpool hash function to provide confidentiality and authenticity, and the elliptic curve digital signature algorithm is used to provide authenticity and integrity. The proposed algorithms are based on the digital imaging and communication in medicine (DICOM) standard; however, unlike the standard, the algorithms provide confidentiality, authenticity and integrity for the header data, as well as for the pixel data of the DICOM images. Effectiveness of the proposed algorithms is evaluated and demonstrated through extensive experimentation using a benchmark set of DICOM images.


international conference on applications of digital information and web technologies | 2008

Watermarking relational database systems

Ashraf Odeh; Ali Al-Haj

Watermarking relational databases is an emerging research area that deals with the legal issue of copyright protection of relational databases. In this paper, we propose an efficient database watermarking algorithm based on inserting a binary image watermark in the dasiatimepsila attribute of database tuples. Experimental results demonstrate the robustness of the proposed algorithm against common database attacks.


international conference on applications of digital information and web technologies | 2008

Optimized DWT-based image watermarking

Aymen Abu-Errub; Ali Al-Haj

The discrete wavelet transform is used extensively as a basis for efficient digital image watermarking. However, most wavelets-based watermarking algorithms failed to provide perceptual transparency and robustness simultaneously, since these two watermarking requirements are conflicting requirements. In this paper, we treat the image watermarking problem as an optimization problem and solve it using genetic algorithms. Simulation results indicate optimal image watermarking is achieved only if the watermark is embedded in specific wavelet sub-bands and watermark- amplification values were used.


international conference on digital information management | 2010

Hybrid DWT-SVD audio watermarking

Ali Al-Haj; Christina Twal; Ahmad A. Mohammad

Audio watermarking is a relatively new technology that aims to embed copyright information in audio signals as a proof of their ownership. The driving force behind this technology has been the ever-increasing illegal manipulation of genuine audio products released by the music industry. In this paper, we propose an effective, robust, and inaudible audio watermarking algorithm. The effectiveness of algorithm has been brought by virtue of applying a cascade of two powerful mathematical transforms; the discrete wavelets transform (DWT) and the singular value decomposition (SVD). Reported experimental results demonstrate the effectiveness of the proposed algorithm.


Journal of Digital Imaging | 2017

Crypto-Watermarking of Transmitted Medical Images.

Ali Al-Haj; Ahmad A. Mohammad; Alaa’ Amer

Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a region-based, crypto-watermarking algorithm capable of providing confidentiality, authenticity, and integrity for medical images of different modalities. The proposed algorithm provides authenticity by embedding robust watermarks in images’ region of non-interest using SVD in the DWT domain. Integrity is provided in two levels: strict integrity implemented by a cryptographic hash watermark, and content-based integrity implemented by a symmetric encryption-based tamper localization scheme. Confidentiality is achieved as a byproduct of hiding patient’s data in the image. Performance of the algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization, using different medical images. The results showed the effectiveness of the algorithm in providing security for telemedicine applications.


international conference on innovations in information technology | 2008

Management of medical images using wavelets-based multi-watermarking algorithm

Tuqa Manasrah; Ali Al-Haj

Medical images of all types are produced in hospitals and health centers more than ever. The ease of production of medical images has been facilitated by the advancements in information and communication technologies. Traditional methods used to manage medical images fall short in coping with the great amount of information inherited in medical images. Therefore, there remains immediate need to develop efficient management strategies that work well with all types of medical images. In this paper, we apply a wavelet-based image multi-watermarking algorithm to implement three issues of great importance to the management of medical images. These issues are; image source authentication, image annotation, and image retrieval. Performance of the proposed algorithm was evaluated using four types of medical images; Ultrasound, X-ray, CT and MRI.

Collaboration


Dive into the Ali Al-Haj's collaboration.

Top Co-Authors

Avatar

Ahmad A. Mohammad

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hiba Abdel-Nabi

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge