Mohammad Eyadat
California State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mohammad Eyadat.
Pattern Recognition Letters | 2005
Mohammad Eyadat; Shantaram Vasikarla
In this paper we propose a new approach to predict a fixed fidelity level of a watermarked image while increasing the detection rate. The new approach incorporates a DCT block-based algorithm with human visual system (HVS). The performance of the new approach has been defined in terms of its effectiveness (detection rate) and fidelity. We show experimentally how our novel approach can be used to control distribution of a watermark to get a higher detection rate as well as better fidelity.
international conference on information technology coding and computing | 2004
Mohammad Eyadat
This paper presents results of an experiment performed on DCT block-based image watermarking algorithm. It also proposes and describes four factors that influence the performance of DCT block-based image watermarking algorithm. The experimental results show a great improvement on the performance of implementing the DCT block-based along with the proposed four factors.
international conference on information technology coding and computing | 2005
Mohammad Eyadat; Imad Muhi
With the rapid spread of image and video processing applications and the further development of multimedia technologies, compression standards become more and more important every day. This study was conducted to investigate the role of compression standards in image processing. Digital watermarking algorithm for securing multimedia application is considered one of the most important applications heavily rely on compression standards. It was selected to perform our experimental study by employing wavelet and JPEG compression standards. An analysis of the experiment results indicated that the wavelet outperform JPEG compression standard and applications implemented wavelet have better performance than those implemented JPEG.
international conference on information technology new generations | 2006
Wang-chan Wong; Mohammad Eyadat; Shane Ng
Programming in the large (PITL) is a major challenge for global virtual system development team. One of the issues is the control and management between the design and implementation teams. Ideally, a design team do a system design based on user requirements and an implementation team, supposedly, implement the design. It is hard to enforce the implementation team to follow the design closely especially when the teams are in different geographical locations and in different time zones. We observe that one major cause of this design implementation gap lies in the degree of freedom given to the implementation developers. Given a design, the implementation staff has too many ways to implement it. We adopted software framework in our practice to standardize developments, to reuse major components and eventually to improve the productivity and maintainability of code. However, the side effect of adopting framework comes out as a surprise. It actually enables us to manage and control the design implementation gap more effectively and efficiently
international conference on information technology new generations | 2008
Imad Muhi El-Ddin; Hedley Morris; Mohammad Eyadat
In this paper, we propose a scheme in which the watermarking is carried out in the spatial domain using robust feature points to aid in its embedding and extraction. Specific feature points are not only used to embed the information, but also act as a geometrical reference. We propose here a new algorithm that uses the scale invariant feature transform (SIFT), Shape theory, and projective area-invariants. The Projective Area-Invariants Transformation allows an image with a distinguished triangle to be put in correspondence with a an affine invariant universal image. The new algorithm is based on embedding the watermark in region around robust feature points and using shape theory to remediate the effects of affine attacks.
international conference on information technology | 2007
Mohammad Eyadat; Dorothy M. Fisher
The Web has great potential as the content on the Web can be presented in different formats to make information available to individuals with disabilities. However, the potential of the Web is still largely unrealized. Most of the students in the information systems program are unaware of accessibility issues. Few information systems departments have incorporated universal design and Web accessibility in their curriculum. The objective of the research is to examine WAI (Web accessibility initiative) guidelines for Web accessibility so as to incorporate Web accessibility in information systems curriculum
Journal of Information Privacy and Security | 2015
Mohammad Eyadat
An information security education awareness training (SETA) program is considered one of the key factors for making the information technology environment more secure and efficient. This research aimed at investigating and determining the status of the SETA program in Jordanian universities. The findings indicated an alarmingly high rate of unawareness of security, with no education and training programs available in the surveyed Jordanian universities. The lack of adequate knowledge and security implementation among the majority of the communities of the surveyed universities showed the need of a well-designed SETA program in Jordanian universities.
international conference on information technology: new generations | 2011
Mohammad Eyadat; Soren Larsen
Security challenges have been raised by private and public sectors related to exchange digital data electronically. In the current state, protocols such as the simple mail transfer protocol (SMTP), post office protocol (POP), and internet message access protocol (IMAP) transfer and store email messages in plaintext. Therefore, the confidentiality of email messages cannot be assured. Email sent using these protocols and without using any other security tool, must be assumed to have been read and compromised, because its confidentiality and integrity cannot be assured. Thus in this paper a new approach as a tool for improvement of current popular email protocols is proposed. The novel proposed protocol will be manifested in the Email Security Protocol (ESP) which is designed to add a layer of security and confidentiality to email messages transmitted over unsecured public networks. ESP is designed in three models to allow efficient and effective implementation upon various information system architectures. The result of testing the new proposed approach showed superior performance comparing to the existing one.
international conference on information technology: new generations | 2009
Mohammad Eyadat; Hedley Morris; Imad Muhi El-Ddin
We have developed a new watermarking process based on the curvelet transform. By selectively removing specific ranges of curvelet coefficients we introduce a high fidelity watermark into an image. This mark has a natural resilience against rotation and scaling. The watermark can be exactly retrieved.
international conference on information technology coding and computing | 2005
W. C. Wong; Eric Moy; Mohammad Eyadat
As more and more organizations and companies increasingly outsource system development projects offshore the complexity of management and support increases proportionally. Traditional software development support tools are no longer sufficient to support a geographically and culturally diversified development team. Furthermore, to increase the chance of success, clients and stakeholders should be invited to participate in every step of the development. There is a need of a software development support portal (SDSP) to tie all the pieces together. In this paper, we propose a software development support portal that is designed and implemented based on a commercially available peer-to-peer (P2P) platform.