Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Hamid A. Jalab
Total Records ( 6 ) for Hamid A. Jalab
  Alaa Y. Taqa and Hamid A. Jalab
  Problem statement: Skin detection is a common primitive for many human-related image processing applications, such as video surveillance, naked image filters and face detection. Skin color is considered as a useful and discriminating spatial feature for many applications, but it is not robust enough to deal with complex image environments. Skin tones range from dark (some Africans) to light white (Caucasians and some Europeans). In addition, both the light-changing conditions and the existence of objects with skin-like colors could cause some major difficulties faced pixel-based skin detector depending only on a color feature. Approach: This study proposed a novel Fuzzy Inference System (FIS) for skin detection, which combines both color and texture features. To increase the reliability of the skin detection process, neighborhood pixel information is incorporated into the proposed method. The color feature is represented using RGB color model, while the texture feature is estimated using three statistical measures: standard deviation, entropy and range. The subtractive clustering-based fuzzy system method and the Sugeno type reasoning mechanism are used for modeling FIS-based skin detection. The proposed approach builds a fuzzy model of skin detection from existing images within skin and non-skin regions (output data) and from both color and texture features of the skin regions (input data). Results: The proposed skin detection method achieved a true positive rate of approximately 90% and a false positive rate of approximately 0.22%. Furthermore, this study analyzes and compares the obtained results from the proposed skin detection with threshold-based skin detector to show the level of robustness, using both color and texture features in the proposed skin detector. Conclusion: It was found that a skin detector based on both color and texture features can lead to an efficient and more reliable skin detection method compared with other state-of-the-art threshold-based skin detectors. The proposed detector reduces the FP rate to 0.22% compared with a skin detector based on predefined color rules.
  Hamid A. Jalab
  This study presents a novel algorithm to recognize a set of static hand gestures for the Human-Computer Interaction (HCI), based on hand segmentation using both wavelet network for images feature extraction, and supervised feed-forward neural network with back propagation training algorithm for recognition. One hundred and twenty hand gesture images were used for training and 60 for testing. The best classification rate of 97% was obtained for the testing set.
  Ali K. Hmood , Hamid A. Jalab , Z.M. Kasirun , B.B. Zaidan and A.A. Zaidan
  The aim of this study is to review the strength and weakness for the possible multimedia cover for the steganography approaches. In addition, the security level of each approach and how is probable to combine the steganography and cryptography. Steganography is an art on which the data can be hide in other data as cover, the multimedia files is the commonly used for hiding data. The main aspects of the steganography is the capacity and security, where the capacity refer to how much data can be hidden in the cover carrier, while the security concern with the ability of disclose or altering the data by unauthorized party. The multimedia files, such as, image, video, audio and text are the possible covers for hiding secure information or data. Each of these covers has advantages and disadvantages; as a result of this study we will discuss the possibility to use these files as a cover. In the last part of this study, we suggest a further direction to improve the capacity and security aspects.
  A.A. Zaidan , B.B. Zaidan , Ali K. Al-Fraja and Hamid A. Jalab
  The aim of this study is to investigate the methods of steganography using the text file as a cover carrier. The hiding data or Steganography is the art of protecting the information by embedding data in medium carrier, for instants this study illustrates historically this art. The steganography technique has been used mainly to hide secret data within multimedia files and one of used files to hide secret data is the text files. In this study, we have proposed the steganography methods using the text files as a review. The study restricts the weak points of this art by hiding information in text file. As a result of this study, the text based steganography has been discussed and the advantages and disadvantages of using the text file as a cover carrier for steganography has been proposed.
  A.A. Zaidan , B.B. Zaidan , Ali K. Al-Frajat and Hamid A. Jalab


Mr. Sreeram, Anikode Mahadevan; a Graduate Research Assistant, Texas Sustainable Energy & Research Institute, University of Texas pointed out a plagiarism in a paper published in Journal of Applied Sciences vol. 10, issue 18, p. 2161-2167. On the receipt of the letter from Mr. Sreeram, Anikode Mahadevan, the case forwarded to the Ethics Committee of the Science Alert. As per the report of the Ethics Committee, article entitled "An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael" authored by A.A. Zaidan, B.B. Zaidan, Ali K. Al-Frajat and Hamid A. Jalab, published in Journal of Applied Sciences, 10 (18): 2161-2167. (DOI: 10.3923/jas.2010.2161.2167) contains substantial sections of text that have been taken verbatim from earlier publication without clear and unambiguous attribution.

Science Alert considers misappropriation of intellectual property and duplication of text from other authors or publications without clear and unambiguous attribution totally unacceptable.

Plagiarism is a violation of copyright and a serious breach of scientific ethics. The Editors and Publisher have agreed to officially retract this article.

Science Alert is highly thankful to Mr. Sreeram, Anikode Mahadevan; a Graduate Research Assistant, Texas Sustainable Energy & Research Institute, University of Texas for pointing out this plagiarism.

Detail of article from which text has been copied by A.A. Zaidan, B.B. Zaidan, Ali K. Al-Frajat and Hamid A. Jalab:

Daemen, J. and V. Rijmen, 1999. AES proposal: Rijndael. The Rijndael Block Cipher Document Version 2, pp: 1-45.

  Ali K. Hmood , B.B. Zaidan , A.A. Zaidan and Hamid A. Jalab
  In the last few years, we have seen many new and powerful steganography techniques reported in the literature. Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. In this study intends to offer a state of the art overview of the hiding information technique using image file as a cover carrier to illustrate the possibility of using the image for hiding secure information for business and personal use.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility