Claim Missing Document
Check
Articles

Found 4 Documents
Search

Evaluation of speech signal features extraction methods Shayeb, Ismail; Asad, Naseem; Alqadi, Ziad; Jaber, Qazem
Journal of Applied Science, Engineering, Technology, and Education Vol. 2 No. 1 (2020)
Publisher : Yayasan Ahmar Cendekia Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (730.631 KB) | DOI: 10.35877/454RI.asci2151

Abstract

Human speech digital signals are famous and important digital types, they are used in many vital applications which require a high speed processing, so creating a speech signal features is a needed issue. In this research paper we will study more widely used methods of features extraction, we will implement them, and the obtained experimental results will be compared, efficiency parameters such as extraction time and throughput will be obtained and a speedup of each method will be calculated. Speech signal histogram will be used to improve some methods efficiency.
Message steganography using separate locations and blocks Rasras, Rashad J.; Abu Sara, Mutaz Rasmi; Alqadi, Ziad
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 4: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i4.pp4055-4067

Abstract

A novel method of message steganography is introduced to solve the disadvantages of traditional least significant bit (LSB) based methods by dividing the covering-stego image into a secret number of blocks. A chaotic logistic map model was performed using the chaotic parameters and the number of image blocks for generating a chaotic key. This key was then sorted, and the locations of blocks 1 to 8 were used to select the required blocks to be used as covering-stego blocks. The introduced method simplifies the process of message bits hiding and extracting by adopting a batch method of bits hiding and extracting. A comparative analysis was conducted between the outcomes of proposed method and those of prevalent approaches to outline the enhancements in both speed and quality of message steganography.
Developing digital signal clustering method using local binary pattern histogram Rasras, Rashad J.; Zahran, Bilal; Abu Sara, Mutaz Rasmi; AlQadi, Ziad
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i1.pp872-878

Abstract

In this paper we presented a new approach to manipulate a digital signal in order to create a features array, which can be used as a signature to retrieve the signal. Each digital signal is associated with the local binary pattern (LBP) histogram; this histogram will be calculated based on LBP operator, then k-means clustering was used to generate the required features for each digital signal. The proposed method was implemented, tested and the obtained experimental results were analyzed. The results showed the flexibility and accuracy of the proposed method. Althoug different parameters of the digital signal were changed during implementation, the results obtained showed the robustness of the proposed method.
Multilayer crypto method using playing cards shuffling operation J. Rasras, Rashad; Rasmi Abu Sara, Mutaz; Alqadi, Ziad
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.9183

Abstract

An efficient and highly secure method of secret message cryptography will be presented which based on the principle of playing cards shuffling. The method will be implemented in a selected number of layers, each layer will encrypt-decrypt the input message using its own private key (PK), the output of any layer can be taken as a final encrypted-decrypted message, increasing the number of layers will increase the security level of the massage, making the hacking attacks impossible. In the encryption function a key generation and a message blocks shuffling will be executed, while in the decryption function the key generation and the message blocks reverse shuffling will be executed. The PK used in this method will be complicated and it will contain for each layer 2 chaotic parameters (r and x) and the block size (BS), utilizing these parameters, a chaotic logistic map model is run to produce a chaotic key, which is sorted to produce the layer's index key. Applying 4 layers the length of confidential key will be 768 bits, this length will be able to generate a large key space which is robust to hacking attempts. The speed parameters and throughput of the proposed will be calculated and compared with those of other methods.