
Myasar MundherUniversiti Teknologi Malaysia | UTM · Department of Computer Graphics and Multimedia
Myasar Mundher
Master of computer scince
About
17
Publications
3,221
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
118
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (17)
Every day, websites and personal archives generate an increasing number of photographs. The extent of these archives is unfathomable. The ease of usage of these enormous digital image collections contributes to their popularity. However, not all of these databases provide appropriate indexing data. As a result, it’s tough to find information that t...
The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on the forensic case studies because of the limitations of traditional methods such as analysis intensive data manually, intelligence vis...
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a single algorithm. But even so, the hybrid models based on traditional algorithms still face different limitations. This work is focuse...
Multimedia data for both personal and commercial purposes is now accessible to everyone due to the rapid development of the Internet. Consequently, the issue of copyright protection has surfaced and has triggered the development of several techniques for multimedia copyright protection. Such techniques include digital watermarking in which the impo...
A technique for the recognition of motor license plates via vehicle image analysis was presented in this article. The process involves accurate recognition of the license plate location, followed by extraction of the characters of the plate number. Plate edge recognition was performed using morphology algorithms that transformed and adjusted differ...
The computer vision (CV) is an emerging area with sundry promises. This communication encompasses the past development, recent trends and future directions of the CV in the context of deep learning (DL) algorithms-based object detections and localizations techniques. To identify the object location inside an image and recognize it by a computer pro...
Nowadays, image annotation has attracted extensive attention due to the explosive growth of image data. Large amount of researches on AIA have been proposed, mainly including classification-based methods and probabilistic modeling methods. In this paper, a detailed study on state-of-the-art of image annotation was presented devoted to a detailed st...
Recently, much attention has been given to image annotation due to the massive increase in image data volume. One of the image retrieval methods which guarantees the retrieval of images in the same way as texts are automatic image annotation (AIA). Consequently, numerous studies have been conducted on AIA, particularly on the classification-based a...
In the modernized era, the air conditioners are an integrated part of comfort living especially in hot climates. They are used to control the interior spatial temperature, relative humidity, degree of cleanliness, and speed of air streaming. The automatic controllers are the key elements of the modern air conditioning systems that ensure the reliab...
This book presents improved Digital watermarking is a process to embed the secret information into digital data for verifying an identity of the owners by making the assertion about the data and image authentication applications that provide security to watermark, W which is converted to a sequence of random binary R of size n adopted to encrypt th...
— this paper is allocated to digital watermarking is
created as a method to solve this kind of problems. There are
two issues which are embedded watermark image in the host
image without causing any kind of degradation, achieve and
improve both imperceptibility and robustness of watermarked
image before and after attacks. Digital watermarking is a...
This paper presents digital images watermarking approach to sustain the ownership and true authentication. To secure intellectual belongings of images, audio and videos, watermark W is converted into a sequence of bits and in order to encrypt the watermark, sequence of size R is selected randomly. Additionally, a pseudo random number is generated t...
Projects
Project (1)