-
A novel Facial Recognition technique with Focusing on Masked Faces
Authors:
Dana A Abdullah,
Dana Rasul Hamad,
Ismail Y. Maolood,
Hakem Beitollahi,
Aso K. Ameen,
Sirwan A. Aula,
Abdulhady Abas Abdulla,
Mohammed Y. Shakorf,
Sabat Salih Muhamad
Abstract:
Recognizing the same faces with and without masks is important for ensuring consistent identification in security, access control, and public safety. This capability is crucial in scenarios like law enforcement, healthcare, and surveillance, where accurate recognition must be maintained despite facial occlusion. This research focuses on the challenge of recognizing the same faces with and without…
▽ More
Recognizing the same faces with and without masks is important for ensuring consistent identification in security, access control, and public safety. This capability is crucial in scenarios like law enforcement, healthcare, and surveillance, where accurate recognition must be maintained despite facial occlusion. This research focuses on the challenge of recognizing the same faces with and without masks by employing cosine similarity as the primary technique. With the increased use of masks, traditional facial recognition systems face significant accuracy issues, making it crucial to develop methods that can reliably identify individuals in masked conditions. For that reason, this study proposed Masked-Unmasked Face Matching Model (MUFM). This model employs transfer learning using the Visual Geometry Group (VGG16) model to extract significant facial features, which are subsequently classified utilizing the K-Nearest Neighbors (K-NN) algorithm. The cosine similarity metric is employed to compare masked and unmasked faces of the same individuals. This approach represents a novel contribution, as the task of recognizing the same individual with and without a mask using cosine similarity has not been previously addressed. By integrating these advanced methodologies, the research demonstrates effective identification of individuals despite the presence of masks, addressing a significant limitation in traditional systems. Using data is another essential part of this work, by collecting and preparing an image dataset from three different sources especially some of those data are real provided a comprehensive power of this research. The image dataset used were already collected in three different datasets of masked and unmasked for the same faces.
△ Less
Submitted 21 April, 2025; v1 submitted 8 January, 2025;
originally announced January 2025.
-
Secure Steganography Technique Based on Bitplane Indexes
Authors:
Alan Anwer Abdulla,
Sabah A. Jassim,
Harin Sellahewa
Abstract:
This paper is concerned with secret hiding in multiple image bitplanes for increased security without undermining capacity. A secure steganographic algorithm based on bitplanes index manipulation is proposed. The index manipulation is confined to the first two Least Significant Bits of the cover image. The proposed algorithm has the property of un-detectability with respect to stego quality and pa…
▽ More
This paper is concerned with secret hiding in multiple image bitplanes for increased security without undermining capacity. A secure steganographic algorithm based on bitplanes index manipulation is proposed. The index manipulation is confined to the first two Least Significant Bits of the cover image. The proposed algorithm has the property of un-detectability with respect to stego quality and payload capacity. Experimental results demonstrate that the proposed technique is secure against statistical attacks such as pair of value (PoV), Weighted Stego steganalyser (WS), and Multi Bitplane Weighted Stego steganalyser (MLSB-WS).
△ Less
Submitted 26 April, 2020;
originally announced April 2020.
-
Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping
Authors:
Alan A. Abdulla,
Harin Sellahewa,
Sabah A. Jassim
Abstract:
An efficient 2-step steganography technique is proposed to enhance stego image quality and secret message un-detectability. The first step is a preprocessing algorithm that reduces the size of secret images without losing information. This results in improved stego image quality compared to other existing image steganography methods. The proposed secret image size reduction (SISR) algorithm is an…
▽ More
An efficient 2-step steganography technique is proposed to enhance stego image quality and secret message un-detectability. The first step is a preprocessing algorithm that reduces the size of secret images without losing information. This results in improved stego image quality compared to other existing image steganography methods. The proposed secret image size reduction (SISR) algorithm is an efficient spatial domain technique. The second step is an embedding mechanism that relies on Fibonacci representation of pixel intensities to minimize the effect of embedding on the stego image quality. The improvement is attained by using bit-plane(s) mapping instead of bit-plane(s) replacement for embedding. The proposed embedding mechanism outperforms the binary based LSB randomly embedding in two ways: reduced effect on stego quality and increased robustness against statistical steganalysers. Experimental results demonstrate the benefits of the proposed scheme in terms of: 1) SISR ratio (indirectly results in increased capacity); 2) quality of the stego; and 3) robustness against steganalysers such as RS, and WS. Furthermore, experimental results show that the proposed SISR algorithm can be extended to be applicable on DICOM standard medical images. Future security standardization research is proposed that would focus on evaluating the security, performance, and effectiveness of steganography algorithms.
△ Less
Submitted 26 April, 2020;
originally announced April 2020.
-
Efficient High Capacity Steganography Technique
Authors:
Alan Anwer Abdulla,
Sabah A. Jassim,
Harin Sellahewa
Abstract:
Performance indicators characterizing modern steganographic techniques include capacity (i.e. the quantity of data that can be hidden in the cover medium), stego quality (i.e. artifacts visibility), security (i.e. undetectability), and strength or robustness (intended as the resistance against active attacks aimed to destroy the secret message). Fibonacci based embedding techniques have been resea…
▽ More
Performance indicators characterizing modern steganographic techniques include capacity (i.e. the quantity of data that can be hidden in the cover medium), stego quality (i.e. artifacts visibility), security (i.e. undetectability), and strength or robustness (intended as the resistance against active attacks aimed to destroy the secret message). Fibonacci based embedding techniques have been researched and proposed in the literature to achieve efficient steganography in terms of capacity with respect to stego quality. In this paper, we investigated an innovative idea that extends Fibonacci-like steganography by bit-plane(s) mapping instead of bit-plane(s) replacement. Our proposed algorithm increases embedding capacity using bit-plane mapping to embed two bits of the secret message in three bits of a pixel of the cover, at the expense of a marginal loss in stego quality. While existing Fibonacci embedding algorithms do not use certain intensities of the cover for embedding due to the limitation imposed by the Zeckendorf theorem, our proposal solve this problem and make all intensity values candidates for embedding. Experimental results demonstrate that the proposed technique double the embedding capacity when compared to existing Fibonacci methods, and it is secure against statistical attacks such as RS, POV, and difference image histogram (DIH).
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
Steganography Based on Pixel Intensity Value Decomposition
Authors:
Alan Anwer Abdulla,
Harin Sellahewa,
Sabah A. Jassim
Abstract:
This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan-Fibonacci (CF) are evaluated in terms of payload capacity and stego quality. A new technique based on a specific representation is used to decompose pixel intensity values into 16 (virtual) bit-planes suitable for embedding pur…
▽ More
This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan-Fibonacci (CF) are evaluated in terms of payload capacity and stego quality. A new technique based on a specific representation is used to decompose pixel intensity values into 16 (virtual) bit-planes suitable for embedding purposes. The new decomposition scheme has a desirable property whereby the sum of all bit-planes does not exceed the maximum pixel intensity value, i.e. 255. Experimental results demonstrate that the new decomposition scheme offers a better compromise between payload capacity and stego quality than other existing decomposition schemes used for embedding messages. However, embedding in the 6th bit-plane onwards, the proposed scheme offers better stego quality. In general, the new decomposition technique has less effect in terms of quality on pixel value when compared to most existing pixel intensity value decomposition techniques when embedding messages in higher bit-planes.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images
Authors:
Alan A. Abdulla,
Harin Sellahewa,
Sabah A. Jassim
Abstract:
Digital steganography is becoming a common tool for protecting sensitive communications in various applications such as crime(terrorism) prevention whereby law enforcing personals need to remotely compare facial images captured at the scene of crime with faces databases of known criminals(suspects); exchanging military maps or surveillance video in hostile environment(situations); privacy preservi…
▽ More
Digital steganography is becoming a common tool for protecting sensitive communications in various applications such as crime(terrorism) prevention whereby law enforcing personals need to remotely compare facial images captured at the scene of crime with faces databases of known criminals(suspects); exchanging military maps or surveillance video in hostile environment(situations); privacy preserving in the healthcare systems when storing or exchanging patient medical images(records); and prevent bank customers accounts(records) from being accessed illegally by unauthorized users. Existing digital steganography schemes for embedding secret images in cover image files tend not to exploit various redundancies in the secret image bit-stream to deal with the various conflicting requirements on embedding capacity, stego-image quality, and un-detectibility. This paper is concerned with the development of innovative image procedures and data hiding schemes that exploit, as well as increase, similarities between secret image bit-stream and the cover image LSB plane. This will be achieved in two novel steps involving manipulating both the secret and the cover images,prior to embedding, to achieve higher 0:1 ratio in both the secret image bit-stream and the cover image LSB plane. The above two steps strategy has been exploited to use a bit-plane(s) mapping technique, instead of bit-plane(s) replacement to make each cover pixel usable for secret embedding. This paper will demonstrate that this strategy produces stego-images that have minimal distortion, high embedding efficiency, reasonably good stego-image quality and robustness against 3 well-known targeted steganalysis tools.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.