Rasber Rashid

Rasber Rashid
Koya University · Department of Software Engineering (DSWE)

2.81
 · 
Doctor of Philosophy in Computer Science

About

14
Publications
1,823
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
49
Citations
Research Experience
July 2010 - February 2016
The University of Buckingham
Position
  • PhD Researcher
May 2005 - present
Koya University
Position
  • Lecturer

Publications

Publications (14)
Article
Full-text available
First outbreak of COVID-19 was in the city of Wuhan in China in Dec.2019 and then it becomes a pandemic disease all around the world. World Health Organization (WHO) confirmed more than 5.5 million cases and 341,155 deaths from the disease till the time of writing this paper. This new worldwide disease forced researchers to make more precise way to...
Preprint
Full-text available
The Covid-19 first occurs in Wuhan, China in December 2019. After that the virus spread all around the world and at the time of writing this paper the total number of confirmed cases are above 4.7 million with over 315000 deaths. Machine learning algorithms built on radiography images can be used as decision support mechanism to aid radiologists to...
Article
Full-text available
Digital Steganography means hiding sensitive data inside a cover object in a way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustness against attacks. In some cases, we need to take in account not just the invisibility but als...
Conference Paper
Full-text available
Image Steganography is the technique of hiding sensitive data (secrete message) inside cover images in a way that no suspicion occurs to attackers, while steganalysis is the technique of detecting the embedded data by unauthorized persons. As a first step of detecting hidden data, distinguishing between original (Images without secrete message) and...
Conference Paper
Image quality is a major factor influencing pattern recognition accuracy and help detect image tampering for forensics. We are concerned with investigating topological image texture analysis techniques to assess different type of degradation. We use Local Binary Pattern (LBP) as a texture feature descriptor. For any image construct simplicial compl...
Thesis
Full-text available
Biometrics are widely accepted as the most reliable proof of identity, entitlement to services, and for crime-related forensics. Using biometrics for remote authentication is becoming an essential requirement for the development of knowledge-based economy in the digital age. Ensuring security and integrity of the biometric data or templates is crit...
Conference Paper
Full-text available
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to several attacks when it comes to remote authentication over open networks. Steganography based techniques have been used in the context of remote authentication to hide biometric feature vectors. Biometric cryptosyste...
Conference Paper
Full-text available
-Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to several attacks when it comes to remote authentication over open networks. Steganography based techniques have been used in the context of remote authentication to hide biometric feature vectors. Biometric cryp...
Conference Paper
Full-text available
The strategy of extracting discriminant features from a face image is immensely important to accurate face recognition. This paper proposes a feature extraction algorithm based on wavelets and local binary patterns (LBPs). The proposed method decomposes a face image into multiple sub-bands of frequencies using wavelet transform. Each sub-band in th...
Conference Paper
Full-text available
In this paper, a high invisibility face biometric data transfer technique is proposed. The proposed method decomposes a face image into multiple frequency bands using wavelet transform. Each sub-band in the wavelet domain is divided into non-overlapping blocks. Then, local binary pattern histograms (LBPHs) are extracted from each block in each subb...
Conference Paper
Full-text available
This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for suc...
Thesis
The ability to resolve ownership disputes and copyright infringement is difficult in the worldwide digital age. There is an increasing need to develop techniques that protect the owner of digital data. Digital Watermarking is a technique used to embed a known piece of digital data within another piece of digital data. The embedded piece of data act...

Questions and Answers

Question & Answers (5)

Network

Cited By