Mohamed Salman

Learn More
In this paper, we present a scheme for digital watermarking of three-dimensional (3D) triangle meshes in spatial domain. This scheme is robust against cropping, decimation and randomization attacks. The key idea is to define the uniformly populated groups of the triangle normals to embed individual bits of information which are spread over the whole surface(More)
Almost all of the steganographic techniques developed so far require considerable processing, as much as 33% of the whole processing time in case of the fastest method, to define a stable sequence of Data Embedding Primitives (DEPs). We propose the use of an implicit point order (IPO) of 3-D models to establish such a sequence, defined by the description of(More)
—We consider a cooperative relaying system which consists of a number of source terminals, one shared relay, and a common destination with multi-packet reception (MPR) capability. In this paper, we study the stability and delay analysis for two cooperative relaying schemes; the sensing-based cooperative (SBC) scheme and the decision-based cooperative (DBC)(More)
We consider a cognitive radio network with one primary (PU), one secondary user (SU), and two distinct destinations. SU not only exploits the idle time slots (i.e. PU is not transmitting) to send its own packets, but also interfere with the PU with a certain probability that is optimized to maximize the stable throughput of the SU under a delay constraint(More)
We consider a cognitive radio system that consists of primary user, secondary user, and their destinations. The secondary user has a relaying capability, i.e., it transmits the relayed packets from the primary user. Unlike most of the previous works that restrict the secondary user to transmit only in the idle time slots, we assume that the secondary user(More)
  • 1