About
16
Publications
5,563
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
224
Citations
Introduction
Internet of Things, Security, Image Processing, Cyber Security
Current institution
Publications
Publications (16)
Recent advancements in artificial intelligence (AI) have increased interest in intelligent transportation systems, particularly autonomous vehicles. Safe navigation in traffic-heavy environments requires accurate road scene segmentation, yet traditional computer vision methods struggle with complex scenarios. This study emphasizes the role of deep...
Liveness face detection is essential for modern biometric systems, ensuring that input data is genuine and not derived from a false image or video. Liveness face detection in today’s biometric systems will ensure that input comes from a real, live person rather than a manipulated image or video. The novelty of this study lies in combining deep lear...
In the realm of biometrics, face recognition (F.R.) is one of the most exciting new developments. In the past decade, computer vision and artificial intelligence advancements have improved face recognition systems by several orders of magnitude. Many attacks can be launched against these systems, such as the low-cost and low-effort Presentation att...
Biometrics has been evolving as an exciting yet challenging area in the last decade. Though face recognition is one of the most promising biometrics techniques, it is vulnerable to spoofing threats. Many researchers focus on face liveness detection to protect biometric authentication systems from spoofing attacks with printed photos, video replays,...
Numerous technical disciplines examine the information with a non-Euclidean dimension as its fundamental structural basis. This geometrical information is common in several industries, generally huge and complicated (in virtual groups, also on order to billions). Therefore, they are prime candidates for using artificial intelligence methods. We wil...
Mortality rates due to breast cancer in women are very high. Accurate prediction and detection at an early stage of cancer are required for a reduction in death rates. A Computer-Aided Diagnosis (CAD) is very useful for doctors in deciding screening levels. For identifying cancerous tumors, a CAD-based classification of a benign, malignant tumor us...
Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods. Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Researc...
The research is exploring the opportunities available for the application of Predictive analysis using multi regression for invoice generation systems. We work by analyzing the data generated and saved in the database of the clinic. This database contains the financial operations along and also contains other useful information that is being gather...
Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not...