About
19
Publications
19,227
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
324
Citations
Introduction
Publications
Publications (19)
With the rapid growth and adoption of cloud computing, more sensitive information is centralized
onto the cloud every day. For protecting this sensitive information, it must be encrypted before being
outsourced. Current search schemes allow the user to query encrypted data using keywords, but these
schemes do not guarantee the privacy of queries (i...
Detecting knives in surveillance videos are very urgent for public safety. In general, the research in identifying dangerous weapons is relatively new. Knife detection is a very challenging task because knives vary in size and shape. Besides, it easily reflects lights that reduce the visibility of knives in a video sequence. The reflection of light...
Splicing image forgery detection has become a significant research subject in multimedia forensics and security due to its widespread use and its hard detection. Many algorithms have already been executed on the image splicing. The existing algorithms may be affected by some problems, such as high feature dimensionality and low accuracy with high f...
Recently, users and news followers across websites face many fabricated images. Moreover, it goes far beyond that to the point of defaming or imprisoning a person. Hence, image authentication has become a significant issue. One of the most common tampering techniques is copy-move. Keypoint-based methods are considered as an effective method for det...
The immense crime rates resulting from using pistols have led governments to seek solutions to deal with such terrorist incidents. These incidents have a negative impact on public security and cause panic among citizens. From this point, facing a pandemic of weapon violence has become an important research topic. One way to reduce this kind of viol...
Copy-move image forgery detection has become a significant research subject in multimedia forensics and security due to its widespread use and its hard detection. In this type of image forging, a region of the image is copied and pasted elsewhere in the same image. Keypoint-based forgery detection approaches use local visual features to identify th...
Recently, in healthcare sector, the data is
steadily growing and becomes more vital. Most of this
data is embedded in the medical record of the patient. In
fact, Patient Health Records (PHRs) refer to those records
that the patient can maintain, access and share among
different specialists. Storing these PHRs to the cloud
allow the patient to maint...
Migrating Patient Health Record (PHR) to the cloud plays an essential role in the healthcare field. The patient
has become able to maintain, access and share his health record among different specialists anywhere and anytime.
However, he still suffers from security issues related to storing PHR in the cloud. Giving security to an immense volume of...
Recently, the need for digital communication has increased greatly. As a result, the Internet has become the most economical and speedy medium of communication today. Nevertheless, such accessible communication channels have a great chance of being exposed to security threats causing illegal information access. Steganography provides a type of data...
The analysis of human activities is one of the most interesting and important open issues for the automated video surveillance community. In order to understand the behaviors of humans, a higher level of understanding is required, which is generally referred to as activity recognition. While traditional approaches rely on 2D data like images or vid...
Recognizing human activity is one of the important areas of computer vision research today. It plays a vital role in constructing intelligent surveillance systems. Despite the efforts in the past decades, recognizing human activities from videos is still a challenging task. Human activity may have different forms ranging from simple actions to comp...
Human behavior Analysis, using visual information in a given image or sequence of images, has been an active area of research in computer vision community. The image captured by conventional camera does not provide the suitable information to perform comprehensive analysis. However, depth sensors have recently made a new type of data available. Mos...
With the large number of surveillance cameras now in operation, both in public placesand in commercial centers, significant research efforts have been invested in attempts to automate surveillance video analysis. The goal of visual surveillance is not only to put cameras in the place of human eyes, but also to accomplish the entire surveillance tas...
The increased use of video documents for multimedia-based applications has created a demand for strong video database support, including efficient methods for browsing and retrieving video data. Most solutions to video browsing and retrieval of video data rely on visual information only, ignoring the rich source of the accompanying audio signal and...
Classifying video scenes into semantic categories is a research problem of great interest. This process is usually handled using supervised classifiers based on features describing the global distribution of color, texture or edge information of the video image. Obviously, the speech of the video scene contains more detailed semantic information an...
Many universities throughout the world explore the possibilities of on-line delivery of educational programs. These developments have a great potential on the transition from the traditional face-to-face education process to the distance education programs which become one of the rapidly growing computing approaches. In this paper, we developed a d...