Ahmed Taha

Work place: Computer Science Department, Faculty of Computers and Informatics, Benha University, Egypt

E-mail: ahmed.taha@fci.bu.edu.eg

Website:

Research Interests: Computer systems and computational processes, Computer Vision, Image Compression, Image Manipulation, Image Processing

Biography

Dr. Ahmed Taha received his M.Sc. degree and his Ph.D. degree in computer science, at Ain Shams University, Egypt, in February 2009 and July 2015 respectively. He is currently works as assistant professor at computer science department, Benha University, Egypt. His research interests concern: Computer Vision & Image Processing (Human Behavior Analysis - Video Surveillance Systems), Digital Forensics (Image Forgery Detection – Document Forgery Detection), Security (Encryption – Steganography – Cloud Computing), Content-Based Retrieval (Arabic Text Retrieval - Video Scenes Classification-Video Scenes Retrieval – Trademark Image Retrieval - Closed-Caption Technology).

Author Articles
Cloud-based Framework for Efficient Storage of Unstructured Patient Health Records

By Hanya M. Abdallah Ahmed Taha Mazen M. Selim

DOI: https://doi.org/10.5815/ijcnis.2019.06.02, Pub. Date: 8 Jun. 2019

Recently, in healthcare sector, the data is steadily growing and becomes more vital. Most of this data is embedded in the medical record of the patient. In fact, Patient Health Records (PHRs) refer to those records that the patient can maintain, access and share among different specialists. Storing these PHRs to the cloud allow the patient to maintain and share them with different practitioners anywhere and anytime. However, he still suffers from some security and privacy issues. Hence, it is necessary to guarantee the security and privacy of this immense volume of patient's confidential data on the cloud. Anonymization and encryption are the two methods that can be adopted to ensure the security and privacy of PHRs on cloud. In this paper, a cloud-based framework for securing the storage and the retrieval of unstructured PHRs is proposed. This framework combines different encryption techniques to encrypt the different contents of the PHR, to compress medical images and to control the access to these records. In addition, the encrypted files are partitioned into a random number of files before being sent to the cloud storage server. These files are of variable number and variable size. When a user requests to access a PHR from the cloud, the proposed framework first controls access of this user before merging the partitioned files. The decryption of these files is performed on the client side not on the cloud using the secret key, which is owned by authorized user only. Finally, extensive analytical and experimental results are presented. It shows the security, scalability, and efficiency of the proposed framework.

[...] Read more.
A Passive Approach for Detecting Image Splicing using Deep Learning and Haar Wavelet Transform

By Eman I. Abd El-Latif Ahmed Taha Hala H. Zayed

DOI: https://doi.org/10.5815/ijcnis.2019.05.04, Pub. Date: 8 May 2019

Passive image forgery detection has attracted many researchers in the recent years. Image manipulation becomes easier than before because of the fast development of digital image editing software. Image splicing is one of the most widespread methods for tampering images. Research on detection of image splicing still carries great challenges. In this paper, an algorithm based on deep learning approach and wavelet transform is proposed to detect the spliced image. In the deep learning approach, Convolution Neural Network (CNN) is employed to automatically extract features from the spliced image. CNN is applied and then Haar Wavelet Transform (HWT) is used. Support Vector Machine (SVM) is used later for classification. Additional experiments are performed. That is, Discrete Cosine Transform (DCT) replaces HWT and then Principle Component Analysis (PCA) is applied. The proposed algorithm is evaluated on a publicly available image splicing datasets (CASIA v1.0 and CASIA v2.0). It achieves high accuracy while using a relatively low dimension feature vector. Our results demonstrate that the proposed algorithm is effective and accomplishes better performance for detecting the spliced image.

[...] Read more.
Other Articles