Skip Ribbon Commands
Skip to main content
A Bridge Towards Knowledge
Skip Navigation Links Home : Details
Name : Nesreen Otoum

Academic Rank: Assistant Professor

Administrative Position : Faculty Academic Member

Office 7300       Ext No 7300

Email :

Specialization: Software Engineering

Graduate Of: Loughborough University






    Loughborough University
    United Kingdom

  • Journal Paper

      Nesreen.A.Otoum, Eran.A.Edirisinghe , " Quantification of Corneal Neovascularization via Contourlet Transform based Segmentation of Blood Vessels " , "Ubiquitous Computing and Communication Journal",Vol.7,No.5, , , 10/01/2011

  • Conference paper

      Nesreen.A.Otoum, Eran.A.Edirisinghe, " Quantification of Corneal Neovascularization via Contourlet Transform based Segmentation of Blood Vessels " , "The 2nd International Conference on Information and Communication",Vol.,No., IEEE Xplore, Irbid, Jordan, 05/02/2011

      Nesreen A. Otoum; Eran A. Edirisinghe; Harminder Dua; Lana Faraj, " Evaluating the effectiveness of treatment of corneal ulcers via computer-based automatic image analysis " , "Optics, Photonics, and Digital Technologies for Multimedia Applications II",Vol.,No., SPIE Proceedings Vol. 8436: , Brussels, Belgium , 04/01/2012

      Nesreen A. Otoum, E, " A Computer Vision Approach to Quantification of Corneal Neovascularization " , "Imaging and Signal Processing in Healthcare and Technology",Vol.,No., IASTED, Washington, USA, 05/01/2011

      Al-Hazaimeh, Obaida M., Alhindawi, Nouh, Otoum, Nesreen A, " A Novel Video Encryption Algorithm-Based On Speaker Voice As The Public Key " , "International Conference on Control Science and Systems Engineering ",Vol.,No., IEEE, Yantai, China, 12/29/2014 Abstract:
      Advances in the digital content transmission have been extremely increased in the past few years. In addition, the security and privacy issues of the transmitted data have increasingly an important concern in multimedia technology. In this paper, we propose applicable and secure video encryption algorithm. This makes secure video encryption feasible for real-time application. The proposed algorithm concentrates in general on the symmetric key cryptographic technique. Characteristically, the multimedia technology which has been usually used by public users is resulting in a key exchange problem and normally a trusted intermediate authority takes this responsibility. In this paper, we have proposed a novel video encryption algorithm based on the speaker voice to generate a public key which eliminates the need for a trusted third party for key exchange. The generated public key from the speaker’s voice is used to encrypt of the transferred digital multimedia over the open communication channel (i.e. Internet). The experimental results showed that the proposed algorithm is very secure and has on average only 5.4 ms of encryption time per frame, which is significantly smaller compared to the state of the art secure video encryption algorithms.
  • Event Calendar
    <November 2021>