- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Digital Media Forensic Detection
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Digital Rights Management and Security
- Privacy, Security, and Data Protection
- Face and Expression Recognition
- Video Coding and Compression Technologies
- Face recognition and analysis
- Emotion and Mood Recognition
- Biometric Identification and Security
- Advanced Data Compression Techniques
- Time Series Analysis and Forecasting
- Energy Harvesting in Wireless Networks
- Artificial Intelligence in Healthcare and Education
- Solar Thermal and Photovoltaic Systems
- Cybercrime and Law Enforcement Studies
- Explainable Artificial Intelligence (XAI)
- Advanced Image Processing Techniques
- Photovoltaic System Optimization Techniques
- Cloud Data Security Solutions
Curtin University Sarawak
2016-2024
RMIT Vietnam
2023-2024
Multimedia University
2005-2019
Curtin University
2015
A monogenic signal is a two-dimensional analytical that provides the local information of magnitude, phase, and orientation. While it has been applied on field face expression recognition [1], [2], [3], there are no known usages for subtle facial micro-expressions. In this paper, we propose feature representation method which succinctly captures these three low-level components at multiple scales. Riesz wavelet transform employed to obtain multi-scale wavelets, formulated by quaternion...
Abstract Ensuring the cloud data security is a major concern for corporate subscribers and in some cases private users. Confidentiality of stored can be managed by encrypting at client side before outsourcing it to remote storage server. However, once encrypted, will limit server’s capability keyword search since encrypted server simply cannot make plaintext on data. But again we need functionality efficient retrieval To maintain user’s confidentiality, should able perform over additionally...
The unpleasant experience of long queue while waiting to check-in at hotel is a common problem faced by guests especially during holidays. As such, various self-service technologies (SSTs) were introduced over the years researchers with aim increase avenues checking-in guests. Self-check-in kiosk an invention that allows themselves using bar codes sent them in advance. Although are able reduce guests’ time, it cannot be used unlock rooms. This makes mobile device better medium for and access...
SVD-based watermarking algorithm is one of the most preferable algorithms for copyright protection due to its singular values (SVs) that have outstanding stability and represents intrinsic algebraic image properties. Hence, there a good trade-off between robustness imperceptibility. However, been tested against conventional attacks, such as manipulations, do not fully exploit adversary's knowledge. These are vulnerable false-positive problem, where an watermark can be detected in watermarked...
Network steganography is an emerging research field, which exploits packet protocol headers, mechanism, payload, etc. to establish secret communication between two parties over a computer network. The detection of such hidden has not been part intrusion systems that are primarily used detect malicious activities as viruses and malwares. In this paper, we propose packet-length based steganographic techniques implement covert channel. We examine analyze the lengths normal traffic show our can...
An elapsed facial emotion involves changes of contour due to the motions (such as contraction or stretch) muscles located at eyes, nose, lips and etc. Thus, important information such corners contours that are in various regions face crucial recognition expressions, even more apparent for micro-expressions. In this paper, we propose first known notion employing intrinsic two-dimensional (i2D) local structures represent these features micro-expression recognition. To retrieve i2D phase...
A digital access control system allows users to a premise using an card. It is introduced as alternative the most common physical keys and mechanical locks increase level of convenience premise. However, intruder able gain if he/she possesses card or keys. Therefore, in this paper, we propose that utilizes near field communication (NFC) smartphone information hiding technique overcome disadvantage mentioned previously on existing systems. The first protection NFC reader tag initiate second...
Abstract This article presents a virtual machine placement technique aimed at minimizing power usage in heterogeneous cloud data centers. In this study, an innovative model for the of datacenter’s network is provided. The Enriched Discrete Butterfly Optimization method (EDBOA) used as meta-heuristic order to achieve effective mapping machines (VMs) onto physical (PMs). Reverse Order Filling Method (ROFM) was developed solution repair meet requirements BOA. It manipulate solutions identify...
BACKGROUND: Cardiovascular diseases are the most common cause of death worldwide and characterized by arrhythmia (i.e. irregular rhythm heartbeat). Arrhythmia occasionally happens under certain conditions, such as stress. Therefore, it is diff
We show that the two countermeasures proposed in a paper on security of ownership watermarking digital images based singular value decomposition by Loukhaoukha and Chouinard do not solve false-positive detection problem contrast to designers' claim therefore should be used for proof application.
The progression toward spatially scalable video coding (SVC) solutions for ubiquitous endpoint systems introduces challenges to sustain real-time frame rates in downsampling high-resolution videos into multiple layers. In addressing these challenges, we put forward a hardware accelerated algorithm on parallel computing platform. First, investigate the principal architecture of serial Joint-Scalable-Video-Model reference software identify performance limitations SVC. Then, multicore-based is...
This paper presents a low complexity human visual system based watermarking algorithm for H.264 spatial scalable coding. The proposed extracts textural feature from set of 7 high energy quantized coefficients in 4 × luma INTRA-predicted blocks all-slices and embeds watermark into the highly textured block which has at least one non-zero coefficient 6 selected locations. Experiments were conducted by embedding up to 8192 bits four-layer coded video. Results suggest that scheme produces...