Manar Mizher

Manar Mizher
Amman Arab University · Computer Science

Assistant Professor of computer science (visual informatics and its security) at Amman Arab University
Looking for potential collaborators in video forgery detection and video authentication based on deep learning.

About

21
Publications
3,657
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
95
Citations
Introduction
I'am an assistant professor at Amman Arab University since 2019 at cyber security department. I received the PhD degree from the Institute of Visual Informatics (IVI), Universiti Kebangsaan Malaysia (UKM) in 2019, received the MSc degree from the University of Jordan 2010 and received the BSc degree in computer science from the Al-Zaytoonah University of Jordan in 2005. My research interests are video summarization and authentication, and visual information encryption over secure protocols.

Publications

Publications (21)
Article
Full-text available
Artificial Intelligence techniques, such as optimization algorithms, have become essential for success in many fields. Therefore, most researchers, especially in computer and engineering sciences, focused their efforts and abilities on adapting the optimization algorithms for solving various problems. This review introduces one of the recent nature...
Article
Full-text available
Hundreds of millions of people worldwide use computing devices and services, including smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most secure encryption methods for image encryption in many applications, such as voting security, online transaction security, and privacy protection. An essential step in VC is enc...
Article
Cloud computing is a model of technology that offers access to system resources with advanced level of services ability. These resources are measured reliable, flexible and affordable for several kinds of applications and users. Gaming manufacturing is one filed that expands the profits of cloud computing as numerous new cloud gaming designs have b...
Conference Paper
The concept of mobile cloud computing (MCC) becomes a commonly recent trend because of the impact of the covid-19 pandemic on most vital sectors around the world. The educational sector has been affected by the covid-19 pandemic lockdowns. The paradigm shift in education strategies has greatly affected many groups in society related to the educatio...
Conference Paper
Determining video authenticity has become a challenging task in video forgery detection and localization systems. One of the core difficulties is to extract a suitable feature descriptor. The recent studies on passive object-based video authentication are limited to localize the forged frames in copy-paste/delete object forgery. That is done withou...
Article
Full-text available
Cloud computing is an information technology model that provides access to system resources with higher level of services capability. These resources are considered reliable, flexible and affordable for many types of applications and users. Gaming industry is one filed that gained benefits of cloud computing as new cloud gaming architectures have b...
Article
With the continued evolution of three dimensional (3D) object presentation and usage, the security of such objects has become an increasingly desirable research area. Previous efforts mostly concentrated on the encryption of point clouds, solid models, meshes, and 3D textured models. The (texture map) part of meshed 3D objects was overlooked by pre...
Article
Full-text available
Key frame extraction is one of the critical techniques in computer vision fields such as video search, video identification and video forgeries detection. The extracted key frames should be sufficient key frames that preserve main actions in a video with compact representation. The objective of this work is to improve our previous action key frames...
Article
Full-text available
Key frame extraction is one of the critical techniques in computer vision fields such as video search, video identification and video forgeries detection. The extracted key frames should be sufficient key frames that preserve main actions in a video with compact representation. The objective of this work is to improve our previous action key frames...
Article
Full-text available
In cryptography, the previous research generally appears ambiguous and complex to the novice researcher due to the use of complex mathematical equations and rules of cryptography. Moreover, many research approaches lack flexibility in their key length or in their level of encryption. Consequently, combining simplicity, flexibility, and reliability...
Conference Paper
Key frame extraction is an important algorithm for video summarisation, video retrieval, and generating video fingerprint. The extracted key frames should represent a video sequence in a compact way and brief the main actions to achieve meaningful key frames. Therefore, we present a key frames extraction algorithm based on the L1-norm by accumulati...
Article
Full-text available
Key frame extraction is an essential technique in the computer vision field. The extracted key frames should brief the salient events with an excellent feasibility, great efficiency, and with a high-level of robustness. Thus, it is not an easy problem to solve because it is attributed to many visual features. This paper intends to solve this proble...
Article
Full-text available
Key frame extraction is an essential technique in the computer vision field. The extracted key frames should brief the salient events with an excellent feasibility, great efficiency, and with a high-level of robustness. Thus, it is not an easy problem to solve because it is attributed to many visual features. This paper intends to solve this proble...
Article
The term video attack has gained attention under the name video forgery. The simplest type of video forgery is copy-move tampering which can be detected by human eyes. The complex type of video forgery is video falsifying which is more professional than copy-move as highly improved techniques are needed to detect a falsified video. The difficulty o...
Article
Full-text available
Bandwidth (BW) resources are scarce and valuable in Wireless Sensor Networks (WSNs). Managing this scarcity in BW is a key challenge in WSN's environments. Achieving high BW utilization (BWU) will rise the Quality of Service (QoS) that network can guarantee, without the omission of the importance of concurring BWU, with the minimizing of connection...
Article
Full-text available
The wireless sensor network consists of three main components: a large number of small-sized sensors, a remote sink connected to the internet, and a cluster head whose existence depends on the overall network structure. The sensor in the wireless sensor network can be deployed through many ways, such as a simple model, a random walk model, and a ra...
Conference Paper
Full-text available
In the area of video content detection, and extraction the automatic moving regions detection systems play an essential role. Without the analysis of the region features, it is hard to succeed high accuracy on video retrieval, video copy detection and video forgery detection. Moving object detection becomes a hot research field and gets a great amo...

Questions

Questions (2)
Question
As a new researcher, you need to choose a good journal to send your new manuscript to it. Hence, I suggested for you many websites, these websites can help you to choose a high impact suitable journal which can fit your manuscript subject. Moreover, after writing a short list of the candidate journals, you should use the journal ISSN to be sure that which journals are listed on Scopus and Clarivate master list. This step protects you from stuck with a fake journal or a journal no more can be listed at the Scopes/Clarivate sites.
Clarivate
Scopus sources list
------------------------------------
Elsevier® Journal Finder
springer journal suggester
Wiley authorservices
IEEE publication-recommender
EndNote Match
Sjfinder
SJR
ores
Enago Open Access Journal Finder
Edanz Journal Selector
University of Wollongong Australia Journal finder tools
Journal/Author Name Estimator (JANE)
Find My Journal
Journal Guide
Taylor & Francis
Cofactor

Network

Cited By