- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Chaos-based Image/Signal Encryption
- Medical Imaging and Analysis
- Medical Image Segmentation Techniques
- Video Coding and Compression Technologies
- Advanced Vision and Imaging
- Handwritten Text Recognition Techniques
- Advanced Image and Video Retrieval Techniques
- Optical measurement and interference techniques
- Image Processing and 3D Reconstruction
- Advanced Optical Sensing Technologies
- 3D Shape Modeling and Analysis
- AI in cancer detection
- Vehicle License Plate Recognition
- Automotive and Human Injury Biomechanics
- Voice and Speech Disorders
- Advanced Data Compression Techniques
- Satellite Communication Systems
- Image and Video Stabilization
- Video Surveillance and Tracking Methods
- Medical Imaging Techniques and Applications
- Lower Extremity Biomechanics and Pathologies
- Image and Signal Denoising Methods
- Osteoarthritis Treatment and Mechanisms
University of Canberra
2014-2022
UNSW Sydney
2013-2022
UNSW Canberra
2012-2018
The illegal distribution of a digital movie is common and significant threat to the film industry. With advent high-speed broadband Internet access, pirated copy video can now be easily distributed global audience. A possible means limiting this type theft watermarking whereby additional information, called watermark, embedded in host video. This watermark extracted at decoder used determine whether content watermarked. paper presents review techniques which their applications, challenges,...
Illegal distribution of a digital movie is significant threat to the film industries. With advent high-speed broadband Internet access, pirated copy video can be easily distributed global audience. Digital watermarking possible means limiting this type distribution. In existing methods, watermark usually embedded into luminance channel frame, which affects imperceptibility. addition, none techniques are robust combination commonly used attacks, such as compression, upscaling, rotation,...
Text recognition in natural scene images is a challenging problem computer vision. Different than the optical character (OCR), text more complex due to variations size, colors, fonts, orientations, backgrounds, occlusion, illuminations and uneven lighting conditions. In this paper, we propose segmentation-free method based on deep convolutional recurrent neural network solve of cursive recognition, particularly focusing Urdu scenes. Compared non-cursive scripts, writing styles, several...
The popularity of 3D video is increasing daily due to the availability low-cost televisions and high-speed Internet access. However, currently contents can be distributed illegally without any protection. For views generated using a depth-image-based rendering technique, not only left right as content, but also center, left, or individually 2D content. As digital watermarking possible way protecting these from unauthorized distribution, in this paper, we propose method for rendered video. In...
A structural health monitoring (SHM) system is an approach for identifying the damages caused to various kinds of structures using different functions and providing necessary feedback about structure’s conditions. As civil are backbone our society, determine its daily operations a very important issue. The performance measurement those manual whereas computer-based could automatically assess identify exact location. Recently, wireless sensor networks (WSNs) have attracted great deal...
The accuracy of current natural scene text recognition algorithms is limited by the poor performance character methods for these images. complex backgrounds, variations in writing, size, orientations, low resolution and multi-language make images a challenging task. Conventional machine learning deep learning-based have been developed that achieved satisfactory results, but cursive such as Arabic Urdu scripts still an open research problem. characters are connected difficult to segment...
Video watermarking techniques can be used to prevent unauthorized users from illegally distributing videos across (social) media networks. However, current solutions are unable embed a perceptually invisible watermark which is robust the distortions introduced by camcording. These watermark-disrupting include lossy compression, addition of noise, frame-rate conversion and geometric distortions. In this paper, we present novel video technique that blind camcording attacks. The proposed...
Reading text in natural scene images is an active research area the fields of computer vision and pattern recognition as detection, script identification are required. In this data article, a comprehensive dataset for Urdu detection presented analysed. To develop dataset, more than 2500 were captured using digital camera built-in mobile phone camera. Three separate datasets isolated character images, cropped word end-to-end spotting developed. The contain much larger number samples existing...
The piracy of a digital movie is significant problem for studios and producers but can be prevented by video watermarking. In existing watermarking algorithms, robustness to several attacks on the watermark has been improved. However, none these techniques are robust combination common geometric distortions scaling, rotation, cropping downscaling in resolution with other such as compression. this paper, blind algorithm proposed where embedded singular values dual-tree complex wavelet...
The evolution of technologies for the capture human movement has been motivated by a number potential applications across wide variety fields. However, capturing motion in 3D is difficult an outdoor environment when it performed without controlled surroundings. In this paper, stereo camera rig with ultra-wide baseline distance and conventional cameras fish-eye lenses proposed. Its provide field view (FOV) which increases coverage area also enables to be increased cover common required both...
The amount of unauthorized distribution 3D video is increasing day by due to the availability high speed Internet and low cost TV. Note that, not only both left right views generated using depth-image-based rendering can be distributed as content but also centre, or view individually 2D content. Video watermarking a possible way protect this type illegal distribution. In paper, we propose digital method for rendered each left, view. method, watermark embedded into centre dual-tree complex...
Unauthorized redistribution of a movie is common threat to digital media that can be prevented by video watermarking. The watermark commonly embedded into the luminance (Y) component frame. chrominance (U) supports more distortion than Y without being perceived human eyes. Thus, in our proposed approach, U each frame sequence using dual-tree complex wavelet transform (DT CWT). This approach aims provide perceptually invisible high quality watermarked video. detection performed original...
Piracy of a digital movie is significant threat for studios and producers. Digital video watermarking an important technique that can be used to protect the content. In existing algorithms, robustness several attacks watermark has been improved. However, none techniques are robust combination common geometric distortions scaling, rotation, cropping with other attacks. this paper, we propose blind algorithm where embedded into both chrominance channels using dual-tree complex wavelet...
Due to the availability of high speed online streaming sites, a pirated copy digital video can be easily distributed global audience. This paper proposes watermarking technique based on dual-tree complex wavelet transform that protect this content. In scheme, watermark is embedded into chrominance channel frames provide quality watermarked video. The detectable without reference content as well original which makes method robust temporal synchronization attacks such frame dropping and rate...
Forensic watermarking is used to track down digital pirates after they illegally redistribute video content. Although existing algorithms often resist common signal processing attacks, are not always robust against camcording attacks. As a solution in the state of art, registration methods align attacked original one. However, watermark detection still fails when quality sufficiently decreased or exposed targeted Therefore, this paper proposes novel fallback system that aims detect...
Watermarking enables the identification of digital pirates that illegally redistribute copyright-protected videos. One main challenges is for watermark to be imperceptible, while not increasing video bit rate. Additionally, system should robust attacks attempt remove watermark. Therefore, this paper proposes a watermarking technique does degrade quality nor negatively affect In other words, it preserves encoder's compression efficiency or rate-distortion performance. For embedding,...
Structural changes in the cervical muscles are cause of most injurious and non-injurious neck pain for which surgery therapy used as medical interventions. In clinical practice, correct diagnosis disorders planning treatments region require high-precision 3-dimensional (3D) visualisation anatomy patients’ muscles, necessitates highly accurate delineation muscles. However, segmenting is an extremely difficult task due to their identical complexions compactness imaging data. As far we know,...
Effective motion compensated prediction plays a significant role in efficient video compression. Image registration can be used to estimate the of scene frame by finding geometric transformation which automatically aligns reference and target images. In coding literature, image has been applied find global frame. However, if individual objects is inconsistent across time, may provide very inefficient representation true present scene. this paper we propose estimation algorithm for using new...
Efficient video compression relies heavily on mitigating the temporal redundancy that exists between successive frames. This is achieved through effective motion modelling. In conventional coding standards, of current frame modelled from neighbouring frames using block-based estimation techniques. However, as discontinuities are tied to moving objects in a frame, techniques unable model actual individual objects. this paper, an object-based hierarchical and prediction technique for...
Whiplash-associated disorder (WAD) is a commonly occurring injury that often results from neck trauma suffered in car accidents. However the cause of condition still unknown and there no definitive clinical test for presence condition. Researchers have begun to analyze size muscles fatty infiltrates help understand WAD. this analysis requires high precision delineation which very challenging due lack distinctive features magnetic resonance imaging (MRI). This paper presents novel atlas-based...
Reduction of the temporal redundancies among frames, which can be achieved by proper motion-compensated prediction, is key to efficient video compression. Image registration a technique, exploited find motion between frames. As an individual scene in frame varying across time, it important object for prediction instead finding global as has been used coding literature. In this paper, we propose estimation technique that estimates correct rather than estimating combination objects frame. This...
This paper presents a framework for inter-patient image registration which uses multi-thresholds, multi-similarity measures and multi-transformations based on compactly supported spline discrete periodic wavelets (DPSWs) using the Gauss-Newton gradient descent (GNGD) (GD) optimization methods. Our primary intellectual contribution is incorporating DPSWs in transformation while another includes fusing out-of-range concept surface matching technique implemented by measures. In particular, as...
Convolutional neural networks (CNNs) have achieved expert-level performance in many image processing applications. However, CNNs face the vanishing gradient problem when number of layers are increased beyond a certain threshold. In this paper, new two-stage U-Net++ (TS-UNet++) architecture is proposed to address problem. The uses two different types deep rather than traditional multi-stage network, and U-Net architectures first second stages respectively. An extra convolutional block added...