-
Shadow Detection and Geo-tagged Image Information Based Strategic Infrastructure Characterization
Authors:
E. MD. Abdelrahim,
Romany F. Mansour
Abstract:
Exploring the significance of geo-tagged information of a satellite image and associated shadow information in the image to enable man-made infrastructure dimensional characterization, in this paper a novel approach has been developed to estimate the height of a man-made structure accurately. Our proposed method applies shadow detection and shadow feature along with geo-tagged information retrieve…
▽ More
Exploring the significance of geo-tagged information of a satellite image and associated shadow information in the image to enable man-made infrastructure dimensional characterization, in this paper a novel approach has been developed to estimate the height of a man-made structure accurately. Our proposed method applies shadow detection and shadow feature along with geo-tagged information retrieved through Google Earth tools, to estimate the structural dimension of the man-made infrastructure. To characterize the dimensional features of the man-made structure, we have considered Google Earth satellite images with precise and crisp edge as well as shadow length information, which have been obtained using freely available Google Earth information retrieval tool. Applying our proposed mathematical formulation, the height of man-made structures as well as neighbouring structures have been estimated which can be used for certain strategic decision purposes. The proposed method can be applicable for professionals exploring dimensional characterization of relatively low height constructions as well as defence purposes. Our proposed model has outperformed majority of existing approaches, particularly in terms of accuracy of height estimation of man-made structures.
△ Less
Submitted 19 March, 2018; v1 submitted 25 September, 2017;
originally announced September 2017.
-
An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications
Authors:
Romany F. Mansour,
Elsaid MD. Abdelrahim
Abstract:
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices being located remotely. However, to ensure accurate and optimal telemedicine there is the requirement of seamless or flawless biomedical informat…
▽ More
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices being located remotely. However, to ensure accurate and optimal telemedicine there is the requirement of seamless or flawless biomedical information about patient. On the contrary, medical data transmitted over insecure channel often remains prone to get manipulated or corrupted by attackers. The existing cryptosystems alone are not sufficient to deal with these issues and hence in this paper a highly robust reversible image steganography model has been developed for secret information hiding. Unlike traditional wavelet transform techniques, we incorporated Discrete Ripplet Transformation (DRT) technique for message embedding in the medical cover images. In addition, to assure seamless communication over insecure channel, a dual cryptosystem model containing proposed steganography scheme and RSA cryptosystem has been developed. One of the key novelties of the proposed research work is the use of adaptive genetic algorithm (AGA) for optimal pixel adjustment process (OPAP) that enriches data hiding capacity as well as imperceptibility features. The performance assessment reveals that the proposed steganography model outperforms other wavelet transformation based approaches in terms of high PSNR, embedding capacity, imperceptibility etc.
△ Less
Submitted 30 April, 2018; v1 submitted 25 September, 2017;
originally announced September 2017.
-
MAX-consensus in open multi-agent systems with gossip interactions
Authors:
Mahmoud Abdelrahim,
Julien M. Hendrickx,
W. P. M. H. Heemels
Abstract:
We study the problem of distributed maximum computation in an open multi-agent system, where agents can leave and arrive during the execution of the algorithm. The main challenge comes from the possibility that the agent holding the largest value leaves the system, which changes the value to be computed. The algorithms must as a result be endowed with mechanisms allowing to forget outdated informa…
▽ More
We study the problem of distributed maximum computation in an open multi-agent system, where agents can leave and arrive during the execution of the algorithm. The main challenge comes from the possibility that the agent holding the largest value leaves the system, which changes the value to be computed. The algorithms must as a result be endowed with mechanisms allowing to forget outdated information. The focus is on systems in which interactions are pairwise gossips between randomly selected agents. We consider situations where leaving agents can send a last message, and situations where they cannot. For both cases, we provide algorithms able to eventually compute the maximum of the values held by agents.
△ Less
Submitted 18 September, 2017;
originally announced September 2017.