Rehan Ashraf

ORCID: 0000-0003-0893-4791
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Image Retrieval and Classification Techniques
  • Advanced Image and Video Retrieval Techniques
  • Remote-Sensing Image Classification
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Advanced Malware Detection Techniques
  • Chaos-based Image/Signal Encryption
  • Radiomics and Machine Learning in Medical Imaging
  • Software-Defined Networks and 5G
  • Internet Traffic Analysis and Secure E-voting
  • Network Traffic and Congestion Control
  • AI in cancer detection
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Law in Society and Culture
  • Reproductive Physiology in Livestock
  • Industrial Vision Systems and Defect Detection
  • Image Processing Techniques and Applications
  • Lung Cancer Diagnosis and Treatment
  • Medical Image Segmentation Techniques
  • Spam and Phishing Detection
  • Face recognition and analysis
  • Mobile Ad Hoc Networks
  • Video Analysis and Summarization
  • Network Security and Intrusion Detection

National Textile University
2017-2024

University of Agriculture Faisalabad
2022-2023

University of Veterinary Science
2022

COMSATS University Islamabad
2018

University of Engineering and Technology Taxila
2015-2016

University of Engineering and Technology Peshawar
2016

In last few decades. Content Based Image Retrieval System (CBIR) is an emerging field to retrieve relevant images from a database. It utilizes the visual contents of image for local and global features. Local feature includes spatial domain which presents significance as well index image. Global shape descriptors, contour representations texture Segmentation process required in extraction technique. challenging task simulate information CBIR system. strategy combines features deal with low...

10.1109/icomet.2018.8346343 article EN 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) 2018-03-01

One of the major requirements content based image retrieval (CBIR) systems is to ensure meaningful against query images. The performance these severely degraded by inclusion which does not contain objects interest in an during representation phase. Segmentation images considered as a solution but there no technique that can guarantee object extraction robust way. Another limitation segmentation most techniques are slow and their results reliable. To overcome problems, bandelet transform...

10.3390/e17063552 article EN Entropy 2015-05-29

Due to the powerful image editing tools images are open several manipulations; therefore, their authenticity is becoming questionable especially when have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine integrity by applying various high-tech mechanisms developed literature. In this paper, analyzed particular type forgery where region an copied pasted onto same create duplication or conceal some existing objects. To...

10.1155/2016/8713202 article EN Mathematical Problems in Engineering 2016-01-01

The requirement for effective image search, which motivates the use of Content-Based Image Retrieval (CBIR) and search similar multimedia contents on basis user query, remains an open research problem computer vision applications. application domains Bag Visual Words (BoVW) based representations are object recognition, classification content-based analysis. Interest point detectors quantized in feature space final histogram or signature do not retain any detail about co-occurrences features...

10.3390/app8112242 article EN cc-by Applied Sciences 2018-11-14

The advancements in digital video technology have empowered surveillance to play a vital role ensuring security and safety. Public private enterprises use systems monitor analyze daily activities. Consequently, massive volume of data is generated videos that require further processing achieve protocol. Analyzing content tedious time-consuming task. Moreover, it also requires high-speed computing hardware. summarization concept has emerged overcome these limitations. This paper presents...

10.1155/2022/7453744 article EN Mathematical Problems in Engineering 2022-05-12

Poultry production is facing severe losses due to the development of resistance against most available antimicrobials in treating various diseases. Moreover, social stigma use antibiotics also there. As, welfare animals, environment, food safety and hygiene are important factors. Something needed that would meet all these stigmas still be able provide best growth, immunity diseases, peak production, disease treatment reduce economic pressure. In recent era, biological products replace...

10.47278/journal.ijvs/2022.175 article EN International Journal of Veterinary Science 2022-01-01

The Bag-of-Visual-Words (BoVW) model is widely used for image classification, object recognition and retrieval problems. In BoVW model, the local features are quantized 2-D space represented in form of order-less histogram visual words. classification performance suffers due to representation image. This paper presents a novel that incorporates spatial information inverted index model. added by calculating global relative orientation words rotation invariant manner. For this, we computed...

10.1371/journal.pone.0198175 article EN cc-by PLoS ONE 2018-06-08

Among constituents of communication architecture, routing is the most energy squeezing process. In this survey article, we are targeting an innovative aspect analysis on in wireless sensor network (WSN) that has never been seen available literature before. This article can be a guiding light for new researchers to comprehend WSN technology, aware routing, and factors affect WSN. insight comprehension then makes ways easy them designing such types algorithms as well evaluating authenticity...

10.1155/2018/9087269 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Due to the fast growth and tradition of internet over last decades, network security problems are increasing vigorously. Humans can not handle speed processes huge amount data required anomalies. Therefore, it needs substantial automation in both accuracy. Intrusion Detection System is one approaches recognize illegal access rare attacks secure networks. In this proposed paper, Naive Bayes, J48 Random Forest classifiers compared compute detection rate accuracy IDS. For experiments, KDD_NSL...

10.33166/aetic.2018.01.005 article EN Annals of Emerging Technologies in Computing 2018-01-01

In today's modern life, digital images have significant importance because they become a leading source of information dissemination. However, the availability image editing tools made it easier to forge contents image; making authenticity untrustful. Different techniques can be used images. Copy move forgery is most popular and common approach where specific part an copied pasted elsewhere in same conceal unwanted or object. this study, we attempted survey several passive block based copy...

10.1109/icet.2015.7389169 article EN 2015-12-01

As digital images play a vital role in multimedia content, the automatic classification of is an open research problem. The Bag Visual Words (BoVW) model used for image classification, retrieval and object recognition problems. In BoVW model, histogram visual words computed without considering spatial layout 2-D space. performance suffers due to lack information about details image. Spatial Pyramid Matching (SPM) popular technique that computes However, SPM not rotation-invariant does allow...

10.2298/csis180105025z article EN cc-by-nc-nd Computer Science and Information Systems 2018-01-01

The exponential increase in usage of the Internet can be seen present era. use social media and cyber-physical systems is rapidly increasing. Social Media platforms like Facebook have become an indispensable part our lives. A large number reported attacks been observed past few years. This study presents a novel model to detect prevent SEBPA (Social Engineering Based Phishing Attacks) on Facebook. Current research first attempt address SEBPA. For Validation proposed four realistic scenarios...

10.1109/bigdata.2018.8622505 article EN 2021 IEEE International Conference on Big Data (Big Data) 2018-12-01

Many smart healthcare centers are deploying long distance, high bandwidth networks in their computer network infrastructure and operation. Transmission control protocol (TCP) is responsible for reliable secure communication of data these medial networks. TCP due to its congestion mechanism, which detecting reacting the network. mechanisms have been developed previously different operating systems. CUBIC, Compound, Fusion default mechanism Linux, Microsoft Windows, Sun Solaris systems,...

10.1109/access.2018.2802841 article EN cc-by-nc-nd IEEE Access 2018-01-01

In this modern life, the digital images are being considered main source of information sharing. The used in various fields such as medical imaging, news reporting, crime investigation, insurance claims etc. However, presence sophisticated image editing tools, credibility is concern. copy-move forgery (CMF) a most popular attack. CMF, region duplicated elsewhere same for producing forged image. Thus, detecting particular artifact an algorithm presented that utilizes Stationary Wavelet...

10.1109/intech.2016.7845040 article EN 2016-08-01

The internet of thing (IoT) is a network interconnected physical devices, computer-based system, home-based application, automobiles and other things that are assigned with the unique IP address devices may have capability to share data or information over networks without having any human machine interaction. IoT generate large volume named Big data. Therefore, concept cloud computing was introduced overcome storages issues on device. Cloud Computing latest emerging field which involves...

10.1109/icict47744.2019.9001945 article EN 2019-11-01

Textile industries play a major role in the growth of economy developing and developed countries. The faulty parts fabric are main problem for textile industry that majorly affects quality fabric. difficult to inspect detect manually. Typically, inspects through human inspection system is time-consuming costly. More importantly, due inspection, fewer defects inspected, which ultimately Due this reason, economic progress directly affected. Therefore, it time develop automatic real-time fault...

10.1080/00405000.2022.2105114 article EN Journal of the Textile Institute 2022-07-29
Coming Soon ...