Thesis
Block Symmetry Predictor to Improve Fractal Image Compression
Various compression methods have been proposed to achieve high compression ratios and high image qualities in low computation time.One of these methods is Fractal Image Compression. The basic idea of fractal image compression is the partitioning of input image into nonoverlapping range blocks. For every range block a similar but larger domain block is found. The set of coefficients of mapping the domain
Image Authentication by Using Logo Embedding
It is becoming easier to tamper with digital images in ways that are difficult to detect .In this work a semi-fragile watermarking scheme is presented. This scheme is applied to digital color image in spatial domain.
Network Node Intrusion Detection System
Computer network technologies have grown rapidly in the last few decades. With the increased use of networked computers for critical applications, computer intrusions have been increased and became a significant threat to these systems and, thus Intrusion Detection Systems (IDS) have become essential addition to security infrastructure of most organizations.This thesis presents the design and plementation of a Network Node Intrusion Detection System (NNIDS) that support IPv4 protocol.
Iris Recognition for Personal Identification Using Gabor Filters
In this work, an identifying and recognizing person technique is presented based on its eye’s iris. The introduce technique utilizes several image processing methods; e.g. edge detection, contour following, chain coding, Gabor filters, image normalization, feature extraction, etc. JPEG images of size 256×256 pixels are converted into grayscale form by averaging their Red, Green and Blue bands.The produced grayscale image then traced into edges and boundaries using Marr-Hildreth edge technique with an appropriate Gaussian standard deviation value (i.e. σ =3).
Encryption of MPEG-1 Video Files
There is a modern type of encryption called selective encryption which depends on the choice of some sensitive areas. The encryption of these areas leads to destroy the whole file.
Network Security Monitoring System
This research is concerned with the design and implementation of a network security monitoring system. A focus was put on monitoring the shared network resources (specifically filing system). In this work, the layers of TCP/IP suite have been studied and their roles in the process of network monitoring were defined, it was found that the internet layer can play the major role.
Image Signature for Content – Based Image Retrieval
With the explosive advancement in imaging technologies and specially with proliferation of the world wide web, image retrieval has attracted the increasing interests of researches in the field of digital libraries, image processing and database system. Research in human perception of image content suggests that content-based image retrieval (CBIR) can follow a sequence of steps. The typical steps of CBIR system are: image query formation, image feature extraction, similarity measurement, indexing and retrieval, and user interaction.
Design and Implementation of Email Filtering Agent
As the number of users connects to the internet increases rapidly, Electronic mail (E-mail) is quickly becoming one of the fastest and most economical forms of communication available, since E-mail is extremely cheep and easy to send. As our lives have become ever increasingly tied up to the online world, the volume of E-mails coming into our inboxes has also been increasing, so the problem of email filtering is a critical one.
Database Personalization in E-Learning
Personalized support for learners became even more important when e-learning take place in distributed database system.This research provides access to learning resources in a distributed e-learning database and it intends to adapt the system to the learner’s needs (personal needs) so that each learner gets the idea that the system was created just for him and knows what he likes.
Audio Denoising Using Wavelet Transform
Audio signals are often contaminated by background environment noise from audio equipments. Audio denoising aims to attenuating the noise while retaining the underlying signals.The focal point of this thesis is to use digital signal processing techniques based on wavelet transform to reduce the noise from the signal. In this research three types of wavelet transform (Haar, D4 and D6 wavelet transforms) and different thresholding criteria have been investigated to truncate the noise from two types of signal (high and low amplitude audio signals).