Skip to main content

Showing 1–6 of 6 results for author: Abdulla, A A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.04444  [pdf

    cs.CV cs.AI

    A novel Facial Recognition technique with Focusing on Masked Faces

    Authors: Dana A Abdullah, Dana Rasul Hamad, Ismail Y. Maolood, Hakem Beitollahi, Aso K. Ameen, Sirwan A. Aula, Abdulhady Abas Abdulla, Mohammed Y. Shakorf, Sabat Salih Muhamad

    Abstract: Recognizing the same faces with and without masks is important for ensuring consistent identification in security, access control, and public safety. This capability is crucial in scenarios like law enforcement, healthcare, and surveillance, where accurate recognition must be maintained despite facial occlusion. This research focuses on the challenge of recognizing the same faces with and without… ▽ More

    Submitted 21 April, 2025; v1 submitted 8 January, 2025; originally announced January 2025.

  2. arXiv:2004.12470  [pdf

    cs.MM

    Secure Steganography Technique Based on Bitplane Indexes

    Authors: Alan Anwer Abdulla, Sabah A. Jassim, Harin Sellahewa

    Abstract: This paper is concerned with secret hiding in multiple image bitplanes for increased security without undermining capacity. A secure steganographic algorithm based on bitplanes index manipulation is proposed. The index manipulation is confined to the first two Least Significant Bits of the cover image. The proposed algorithm has the property of un-detectability with respect to stego quality and pa… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

  3. arXiv:2004.12467  [pdf

    cs.MM

    Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping

    Authors: Alan A. Abdulla, Harin Sellahewa, Sabah A. Jassim

    Abstract: An efficient 2-step steganography technique is proposed to enhance stego image quality and secret message un-detectability. The first step is a preprocessing algorithm that reduces the size of secret images without losing information. This results in improved stego image quality compared to other existing image steganography methods. The proposed secret image size reduction (SISR) algorithm is an… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

  4. arXiv:2004.11984  [pdf

    cs.MM

    Efficient High Capacity Steganography Technique

    Authors: Alan Anwer Abdulla, Sabah A. Jassim, Harin Sellahewa

    Abstract: Performance indicators characterizing modern steganographic techniques include capacity (i.e. the quantity of data that can be hidden in the cover medium), stego quality (i.e. artifacts visibility), security (i.e. undetectability), and strength or robustness (intended as the resistance against active attacks aimed to destroy the secret message). Fibonacci based embedding techniques have been resea… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

  5. arXiv:2004.11977  [pdf

    cs.MM

    Steganography Based on Pixel Intensity Value Decomposition

    Authors: Alan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim

    Abstract: This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan-Fibonacci (CF) are evaluated in terms of payload capacity and stego quality. A new technique based on a specific representation is used to decompose pixel intensity values into 16 (virtual) bit-planes suitable for embedding pur… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

  6. arXiv:2004.11974  [pdf

    cs.MM

    Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images

    Authors: Alan A. Abdulla, Harin Sellahewa, Sabah A. Jassim

    Abstract: Digital steganography is becoming a common tool for protecting sensitive communications in various applications such as crime(terrorism) prevention whereby law enforcing personals need to remotely compare facial images captured at the scene of crime with faces databases of known criminals(suspects); exchanging military maps or surveillance video in hostile environment(situations); privacy preservi… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.