- Video Surveillance and Tracking Methods
- Cryptographic Implementations and Security
- Advanced Image and Video Retrieval Techniques
- Visual Attention and Saliency Detection
- Chaos-based Image/Signal Encryption
- Face recognition and analysis
- Coding theory and cryptography
- Advanced Neural Network Applications
Quaid-i-Azam University
2019
COMSATS University Islamabad
2016-2017
Information Technology University
2017
Augmented Reality (AR) overlays virtual information on real world data, such as displaying useful videos/images of a scene.This paper presents an Enhanced AR (EAR) system that displays statistical players' captured images sports game.We focus the situation where input image is degraded by strong sunlight.Proposed EAR consists enhancement technique to improve accuracy subsequent player and face detection.The followed detection, recognition, statistics display.First, algorithm based...
Substitution box (S-box) is a vital nonlinear component for the security of cryptographic schemes. In this paper, new technique which involves coset diagrams action quotient modular group on projective line over finite field proposed construction an S-box. It constructed by selecting vertices diagram in special manner. A useful transformation involving Fibonacci sequence also used diagram. Finally, all analyses to examine strength are performed. The outcomes encouraging and show that...
Recently, large number of object detection and recognition algorithms are playing a key role in several applications, such as security surveillance. Although, these perform exceptionally well under normal lighting conditions, however their accuracy abruptly degrades non-uniform illuminations, strong sunlight bad conditions. In this paper, we apply our own developed Multi-Scale Retinex (MSR) algorithm pre-processing module to boost the AdaBoost algorithm, which is considered be...