Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohammad Eyadat is active.

Publication


Featured researches published by Mohammad Eyadat.


Pattern Recognition Letters | 2005

Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model

Mohammad Eyadat; Shantaram Vasikarla

In this paper we propose a new approach to predict a fixed fidelity level of a watermarked image while increasing the detection rate. The new approach incorporates a DCT block-based algorithm with human visual system (HVS). The performance of the new approach has been defined in terms of its effectiveness (detection rate) and fidelity. We show experimentally how our novel approach can be used to control distribution of a watermark to get a higher detection rate as well as better fidelity.


international conference on information technology coding and computing | 2004

Factors that affect the performance of the DCT-block based image watermarking algorithms

Mohammad Eyadat

This paper presents results of an experiment performed on DCT block-based image watermarking algorithm. It also proposes and describes four factors that influence the performance of DCT block-based image watermarking algorithm. The experimental results show a great improvement on the performance of implementing the DCT block-based along with the proposed four factors.


international conference on information technology coding and computing | 2005

Compression standards roles in image processing: case study

Mohammad Eyadat; Imad Muhi

With the rapid spread of image and video processing applications and the further development of multimedia technologies, compression standards become more and more important every day. This study was conducted to investigate the role of compression standards in image processing. Digital watermarking algorithm for securing multimedia application is considered one of the most important applications heavily rely on compression standards. It was selected to perform our experimental study by employing wavelet and JPEG compression standards. An analysis of the experiment results indicated that the wavelet outperform JPEG compression standard and applications implemented wavelet have better performance than those implemented JPEG.


international conference on information technology new generations | 2006

Degree of Freedom ― Experience of Applying Software Framework

Wang-chan Wong; Mohammad Eyadat; Shane Ng

Programming in the large (PITL) is a major challenge for global virtual system development team. One of the issues is the control and management between the design and implementation teams. Ideally, a design team do a system design based on user requirements and an implementation team, supposedly, implement the design. It is hard to enforce the implementation team to follow the design closely especially when the teams are in different geographical locations and in different time zones. We observe that one major cause of this design implementation gap lies in the degree of freedom given to the implementation developers. Given a design, the implementation staff has too many ways to implement it. We adopted software framework in our practice to standardize developments, to reuse major components and eventually to improve the productivity and maintainability of code. However, the side effect of adopting framework comes out as a surprise. It actually enables us to manage and control the design implementation gap more effectively and efficiently


international conference on information technology new generations | 2008

Watermarking: A New Approach

Imad Muhi El-Ddin; Hedley Morris; Mohammad Eyadat

In this paper, we propose a scheme in which the watermarking is carried out in the spatial domain using robust feature points to aid in its embedding and extraction. Specific feature points are not only used to embed the information, but also act as a geometrical reference. We propose here a new algorithm that uses the scale invariant feature transform (SIFT), Shape theory, and projective area-invariants. The Projective Area-Invariants Transformation allows an image with a distinguished triangle to be put in correspondence with a an affine invariant universal image. The new algorithm is based on embedding the watermark in region around robust feature points and using shape theory to remediate the effects of affine attacks.


international conference on information technology | 2007

Web Accessibility and Information Systems Curriculum

Mohammad Eyadat; Dorothy M. Fisher

The Web has great potential as the content on the Web can be presented in different formats to make information available to individuals with disabilities. However, the potential of the Web is still largely unrealized. Most of the students in the information systems program are unaware of accessibility issues. Few information systems departments have incorporated universal design and Web accessibility in their curriculum. The objective of the research is to examine WAI (Web accessibility initiative) guidelines for Web accessibility so as to incorporate Web accessibility in information systems curriculum


Journal of Information Privacy and Security | 2015

Information Security: SETA Program Status at Jordanian Universities

Mohammad Eyadat

An information security education awareness training (SETA) program is considered one of the key factors for making the information technology environment more secure and efficient. This research aimed at investigating and determining the status of the SETA program in Jordanian universities. The findings indicated an alarmingly high rate of unawareness of security, with no education and training programs available in the surveyed Jordanian universities. The lack of adequate knowledge and security implementation among the majority of the communities of the surveyed universities showed the need of a well-designed SETA program in Jordanian universities.


international conference on information technology: new generations | 2011

A New Heuristic Approach to Safeguarding Online Digital Data

Mohammad Eyadat; Soren Larsen

Security challenges have been raised by private and public sectors related to exchange digital data electronically. In the current state, protocols such as the simple mail transfer protocol (SMTP), post office protocol (POP), and internet message access protocol (IMAP) transfer and store email messages in plaintext. Therefore, the confidentiality of email messages cannot be assured. Email sent using these protocols and without using any other security tool, must be assumed to have been read and compromised, because its confidentiality and integrity cannot be assured. Thus in this paper a new approach as a tool for improvement of current popular email protocols is proposed. The novel proposed protocol will be manifested in the Email Security Protocol (ESP) which is designed to add a layer of security and confidentiality to email messages transmitted over unsecured public networks. ESP is designed in three models to allow efficient and effective implementation upon various information system architectures. The result of testing the new proposed approach showed superior performance comparing to the existing one.


international conference on information technology: new generations | 2009

Barcode Watermarking

Mohammad Eyadat; Hedley Morris; Imad Muhi El-Ddin

We have developed a new watermarking process based on the curvelet transform. By selectively removing specific ranges of curvelet coefficients we introduce a high fidelity watermark into an image. This mark has a natural resilience against rotation and scaling. The watermark can be exactly retrieved.


international conference on information technology coding and computing | 2005

A software development support portal (SDSP) based on a peer-to-peer platform - a case study

W. C. Wong; Eric Moy; Mohammad Eyadat

As more and more organizations and companies increasingly outsource system development projects offshore the complexity of management and support increases proportionally. Traditional software development support tools are no longer sufficient to support a geographically and culturally diversified development team. Furthermore, to increase the chance of success, clients and stakeholders should be invited to participate in every step of the development. There is a need of a software development support portal (SDSP) to tie all the pieces together. In this paper, we propose a software development support portal that is designed and implemented based on a commercially available peer-to-peer (P2P) platform.

Collaboration


Dive into the Mohammad Eyadat's collaboration.

Top Co-Authors

Avatar

Hedley Morris

Claremont Graduate University

View shared research outputs
Top Co-Authors

Avatar

Dorothy M. Fisher

California State University

View shared research outputs
Top Co-Authors

Avatar

Imad Muhi

New York Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Soren Larsen

California State University

View shared research outputs
Top Co-Authors

Avatar

W. C. Wong

California State University

View shared research outputs
Top Co-Authors

Avatar

Wang-chan Wong

California State University

View shared research outputs
Top Co-Authors

Avatar

Shantaram Vasikarla

American InterContinental University

View shared research outputs
Top Co-Authors

Avatar

Shane Ng

University of Hong Kong

View shared research outputs
Researchain Logo
Decentralizing Knowledge