Hamid A. Jalab

ORCID: 0000-0002-4823-6851
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Advanced Steganography and Watermarking Techniques
  • Fractional Differential Equations Solutions
  • Image and Signal Denoising Methods
  • Image Processing Techniques and Applications
  • Brain Tumor Detection and Classification
  • Radiomics and Machine Learning in Medical Imaging
  • AI in cancer detection
  • Image Retrieval and Classification Techniques
  • Chaos-based Image/Signal Encryption
  • Medical Image Segmentation Techniques
  • Cell Image Analysis Techniques
  • Advanced Image Processing Techniques
  • Image Enhancement Techniques
  • Advanced Neural Network Applications
  • Face and Expression Recognition
  • Advanced Image Fusion Techniques
  • Advanced Image and Video Retrieval Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Video Surveillance and Tracking Methods
  • Nonlinear Differential Equations Analysis
  • Digital Imaging for Blood Diseases
  • COVID-19 diagnosis using AI
  • Face recognition and analysis
  • Iterative Methods for Nonlinear Equations

Thi Qar University
2023-2025

Al-Ayen University
2023-2025

University of Malaya
2014-2023

Information Technology University
2012-2021

Bridge University
2019

University of Salford
2016

Temple University
2015

Sana'a University
2005-2006

Laboratoire d'Informatique de Paris-Nord
2006

Many health systems over the world have collapsed due to limited capacity and a dramatic increase of suspected COVID-19 cases. What has emerged is need for finding an efficient, quick accurate method mitigate overloading radiologists’ efforts diagnose This study presents combination deep learning extracted features with Q-deformed entropy handcrafted discriminating between coronavirus, pneumonia healthy computed tomography (CT) lung scans. In this study, pre-processing used reduce effect...

10.3390/e22050517 article EN cc-by Entropy 2020-05-01

With the rapid development of various multimedia technologies, more and data are generated transmitted in medical, also internet allows for wide distribution digital media data. It becomes much easier to edit, modify duplicate information. Besides that, documents easy copy distribute, therefore it will be faced by many threats. is a big security privacy issue, become necessary find appropriate protection because significance, accuracy sensitivity information, which may include some sensitive...

10.48550/arxiv.1003.4085 preprint EN other-oa arXiv (Cornell University) 2010-01-01

Progresses in the areas of artificial intelligence, machine learning, and medical imaging technologies have allowed development image processing field with some astonishing results last two decades. These innovations enabled clinicians to view human body high-resolution or three-dimensional cross-sectional slices, which resulted an increase accuracy diagnosis examination patients a non-invasive manner. The fundamental step for magnetic resonance (MRI) brain scans classifiers is their ability...

10.1109/access.2019.2922691 article EN cc-by-nc-nd IEEE Access 2019-01-01

One of the major causes poor results in license plate recognition is low quality images affected by multiple factors, such as severe illumination condition, complex background, different weather conditions, night light, and perspective distortions. In this paper, we propose a new mathematical model based on Riesz fractional operator for enhancing details edge information to improve performances text detection methods. The proposed performs convolution operation derivative over each input...

10.1109/tcsvt.2017.2713806 article EN IEEE Transactions on Circuits and Systems for Video Technology 2017-06-08

Brain tumor segmentation in magnetic resonance imaging (MRI) is considered a complex procedure because of the variability shapes and complexity determining location, size, texture. Manual time-consuming task highly prone to human error. Hence, this study proposes an automated method that can identify slices segment across all image volumetric MRI brain scans. First, set algorithms pre-processing stage used clean standardize collected data. A modified gray-level co-occurrence matrix Analysis...

10.3390/sym8110132 article EN Symmetry 2016-11-18

Digital watermarking, which has been proven effective for protecting digital data, recently gained considerable research interest. This study aims to develop an enhanced technique producing watermarked images with high invisibility. During extraction, watermarks can be successfully extracted without the need original image. We have developed discrete wavelet transform a Haar filter embed binary watermark image in selected coefficient blocks. A probabilistic neural network is used extract To...

10.1016/j.jksuci.2015.02.002 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2015-09-11

Today's with increasing identity theft, biometric systems based on fingerprints have a growing importance in protection and access restrictions. Malicious users violate them by presenting fabricated attempts. For example, artificial constructed gelatin, Play-Doh Silicone molds may be misused for fraud forgers to clone fingerprints. This process is called spoofing. To detect such forgeries, some existing methods using handcrafted descriptors been implemented assuring user presence. Most of...

10.1016/j.jestch.2019.06.005 article EN cc-by-nc-nd Engineering Science and Technology an International Journal 2019-07-04

10.1007/s10462-018-9664-9 article EN Artificial Intelligence Review 2018-11-17

The interest in using fractional calculus operators has grown the field of image processing. Image enhancement is one processing tools that aims to improve details an image. medical images a challenging task due unforeseeable variation quality captured images.In this study, we present mathematical model based on class partial differential equations (FPDEs). formulated by proportional-Caputo hybrid operator (PCHO). Moreover, some properties geometric functions unit disk are applied determine...

10.21037/qims-21-15 article EN Quantitative Imaging in Medicine and Surgery 2021-07-05

The aim of this review is to study the methods steganography using video file as a cover carrier. art protecting information through embedding data in medium carrier, for instants illustrate historically art, well describes file. based can be used one file, separated images frames or and audio files. Since that, use more eligible than other multimedia As result study, has been discussed advantages carrier have proposed.

10.3923/jas.2010.1644.1649 article EN Journal of Applied Sciences 2010-07-15

The aim of this study is to review the strength and weakness for possible multimedia cover steganography approaches. In addition, security level each approach how probable combine cryptography. Steganography an art on which data can be hide in other as cover, files commonly used hiding data. main aspects capacity security, where refer much hidden carrier, while concern with ability disclose or altering by unauthorized party. files, such as, image, video, audio text are covers secure...

10.3923/jas.2010.1825.1833 article EN Journal of Applied Sciences 2010-08-01

The current paper presents a content-based image retrieval (CBIR) system using the features extracted by color layout descriptor (CLD) and Gabor texture descriptor. CLD represents spatial distribution of colors with few nonlinear quantized DCT coefficients grid-based average colors, whereas filter works as bandpass for local frequency distribution. These two descriptors are very powerful CBIR systems. Furthermore, combining in systems leads to more accurate results retrieval. To compare...

10.1109/icos.2011.6079266 article EN IEEE Conference on Open Systems 2011-09-01

Purpose: The primary goal of this study is to enhance safety and accessibility for individuals using wheelchairs by enabling automatic wheelchair detection through a visual surveillance system. This contributes the development smart healthcare systems that facilitate autonomous navigation improve mobility support.

10.1080/17483107.2025.2476105 article EN Disability and Rehabilitation Assistive Technology 2025-03-11

Elecronic mail (E-mail) is an essential communication tool that has been greatly abused by spammers to disseminate unwanted information (messages) and spread malicious contents Internet users. Current technologies further accelerated the distribution of spam. Effective controls need be deployed countermeasure ever growing spam problem. Machine learning provides better protective mechanisms are able control This paper summarizes most common techniques used for anti-spam filtering analyzing...

10.5897/ijps.9000424 article EN International Journal of the Physical Sciences 2010-10-04

Time series clustering is an important solution to various problems in numerous fields of research, including business, medical science, and finance. However, conventional algorithms are not practical for time data because they essentially designed static data. This impracticality results poor accuracy several systems. In this paper, a new hybrid algorithm proposed based on the similarity shape first grouped as subclusters time. The then merged using k -Medoids shape. model has two...

10.1155/2014/562194 article EN cc-by The Scientific World JOURNAL 2014-01-01

Region duplication has become common in image forgery owing to the availability of advanced editing software and fully equipped digital cameras. Most existing block-based copy-move detection techniques struggle detect such tampering under postprocessing operations, as scaling JPEG compression. This study proposes a algorithm using Hessian features center-symmetric local binary pattern (CSLBP). The proposed method consists four steps: (1) detecting object based on normalized cut segmentation,...

10.1109/icos.2015.7377269 article EN 2015-08-01
Coming Soon ...