Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Ali Al-Haj
Total Records ( 4 ) for Ali Al-Haj
  Ali Al-Haj
  Multimedia communications require efficient and real-time implementations of multirate digital signal processing systems. The backbone structures of multirate systems are digital multirate filter banks. Therefore, efficient multimedia communications rely, in the first place, on real-time implementations of multirate filter banks. In this paper, we describe a Field Programmable Gate Array (FPGA) implementation of the analysis and synthesis filter banks which are the fundamental components of multirate systems. The implementation utilizes the parallel form of the distributed arithmetic technique which enables maximum exploitation of the parallelism inherent in the multirate filtering operation. Performance results demonstrate the effectiveness of the implementation and suggest that the FPGA platform is indeed attractive for implementing multirate filter banks.
  Ali Al-Haj and Aymen Abu-Errub
  The excellent spatial localization, frequency spread and multi-resolution characteristics of the Discrete Wavelets Transform (DWT), which were similar to the theoretical models of the human visual system, facilitated the development of many imperceptible and robust DWT-based watermarking algorithms. There had been extremely few proposed algorithms on optimized DWT-based image watermarking that can simultaneously provide perceptual transparency and robustness since these two watermarking requirements are conflicting, in this study we treat the DWT-based image watermarking problem as an optimization problem and solve it using genetic algorithms. We demonstrate through the experimental results we obtained that optimal DWT-based image watermarking can be achieved only if watermarking has been applied at specific wavelet sub-bands and by using specific watermark-amplification values.
  Tahani Al-Khatib , Ali Al-Haj , Lama Rajab and Hiba Mohammed
  Problem statement: Video watermarking is well known as the process of embedding copyright information in video bit streams. It had been proposed in recent years to solve the problem of illegal manipulation and distribution of digital video. Approach: In this study, an effective, robust and imperceptible video watermarking algorithm was proposed. This algorithm was based on a cascade of two powerful mathematical transforms; Discrete Wavelets Transform (DWT) and Singular Value Decomposition (SVD). Two different transform domain techniques showed high level of complementary and different levels of robustness against the same attack will be achieved through their combination. Results: The proposed algorithm was tested against imperceptibility and robustness and excellent results were obtained. Conclusion: Experimental results demonstrate the robustness achieved by combining the two transforms.
  Ali Al-Haj and Ashraf Odeh
  Problem statement: Digital multimedia watermarking technology was suggested in the last decade to embed copyright information in digital objects such images, audio and video. However, the increasing use of relational database systems in many real-life applications created an ever increasing need for watermarking database systems. As a result, watermarking relational database systems is now merging as a research area that deals with the legal issue of copyright protection of database systems. Approach: In this study, we proposed an efficient database watermarking algorithm based on inserting binary image watermarks in non-numeric mutli-word attributes of selected database tuples. Results: The algorithm is robust as it resists attempts to remove or degrade the embedded watermark and it is blind as it does not require the original database in order to extract the embedded watermark. Conclusion: Experimental results demonstrated blindness and the robustness of the algorithm against common database attacks.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility