Hatim Aboalsamh
King Saud University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hatim Aboalsamh.
Signal, Image and Video Processing | 2017
Amani A. Alahmadi; Muhammad Hussain; Hatim Aboalsamh; Ghulam Muhammad; George Bebis; Hassan Mathkour
With the development of easy-to-use and sophisticated image editing software, the alteration of the contents of digital images has become very easy to do and hard to detect. A digital image is a very rich source of information and can capture any event perfectly, but because of this reason, its authenticity is questionable. In this paper, a novel passive image forgery detection method is proposed based on local binary pattern (LBP) and discrete cosine transform (DCT) to detect copy–move and splicing forgeries. First, from the chrominance component of the input image, discriminative localized features are extracted by applying 2D DCT in LBP space. Then, support vector machine is used for detection. Experiments carried out on three image forgery benchmark datasets demonstrate the superiority of the method over recent methods in terms of detection accuracy.
International Journal on Artificial Intelligence Tools | 2015
Muhammad Hussain; Sahar Qasem; George Bebis; Ghulam Muhammad; Hatim Aboalsamh; Hassan Mathkour
Due to the maturing of digital image processing techniques, there are many tools that can forge an image easily without leaving visible traces and lead to the problem of the authentication of digital images. Based on the assumption that forgery alters the texture micro-patterns in a digital image and texture descriptors can be used for modeling this change; we employed two stat-of-the-art local texture descriptors: multi-scale Webers law descriptor (multi-WLD) and multi-scale local binary pattern (multi-LBP) for splicing and copy-move forgery detection. As the tamper traces are not visible to open eyes, so the chrominance components of an image encode these traces and were used for modeling tamper traces with the texture descriptors. To reduce the dimension of the feature space and get rid of redundant features, we employed locally learning based (LLB) algorithm. For identifying an image as authentic or tampered, Support vector machine (SVM) was used. This paper presents the thorough investigation for th...
international conference on networking sensing and control | 2013
Ihsan Ullah; Naveed Khan; Hatim Aboalsamh
Robot Network or BOTNET is the biggest network security threats faced by home users, organizations, and governments. Botnet is created by intelligent and up to date hackers, which challenges IT Community in detection, prevention and mitigation from Botnet attacks. This paper discuss about life cycle, topologies, detection and future prospects required to be safe from Botnet attacks.
ieee global conference on signal and information processing | 2013
Amani A. Alahmadi; Muhammad Hussain; Hatim Aboalsamh; Ghulam Muhammad; George Bebis
The authenticity of a digital image suffers from severe threats due to the rise of powerful digital image editing tools that easily alter the image contents without leaving any visible traces of such changes. In this paper, a novel passive splicing image forgery detection scheme based on Local Binary Pattern (LBP) and Discrete Cosine Transform (DCT) is proposed. First, the chrominance component of the input image is divided into overlapping blocks. Then, for each block, LBP is calculated and transformed into frequency domain using 2D DCT. Finally, standard deviations are calculated of respective frequency coefficients of all blocks and they are used as features. For classification, a support vector machine (SVM) is used. Experimental results on benchmark splicing image forgery databases show that the detection accuracy of the proposed method is up to 97%, which is the best accuracy so far.
international symposium on visual computing | 2013
Anwar M. Mirza; Muhammad Hussain; Huda Almuzaini; Ghulam Muhammad; Hatim Aboalsamh; George Bebis
Human perception of the face involves the observation of both coarse (global) and detailed (local) features of the face to identify and categorize a person. Face categorization involves finding common visual cues, such as gender, race and age, which could be used as a precursor to a face recognition system to improve recognition rates. In this paper, we investigate the fusion of both global and local features for gender classification. Global features are obtained using the principal component analysis (PCA) and discrete cosine transformation (DCT) approaches. A spatial local binary pattern (LBP) approach augmented with a two-dimensional DCT approach has been used to find the local features. The performance of the proposed approach has been investigated through extensive experiments performed on FERET database. The proposed approach gives a recognition accuracy of 98.16% on FERET database. Comparisons with some of the existing techniques have shown a marked reduction in number of features used per image to produce results more efficiently and without loss of accuracy for gender classification.
Applied Soft Computing | 2016
Salabat Khan; Muhammad Hussain; Hatim Aboalsamh; Hassan Mathkour; George Bebis; Mohammed Zakariah
Display Omitted Key idea is optimizing Gabor filters such that they respond stronger to features that best discriminate normal and abnormal tissues.Contribution is about a strategy based on PSO and incremental clustering for optimizing a Gabor filter bank for accurate detection.Optimized Gabor filter bank is applied on overlapping blocks of ROIs to collect moment-based features from the magnitudes of Gabor responses. Gabor filter bank has been successfully used for false positive reduction problem and the discrimination of benign and malignant masses in breast cancer detection. However, a generic Gabor filter bank is not adapted to multi-orientation and multi-scale texture micro-patterns present in the regions of interest (ROIs) of mammograms. There are two main optimization concerns: how many filters should be in a Gabor filter band and what should be their parameters. Addressing these issues, this work focuses on finding optimizing Gabor filter banks based on an incremental clustering algorithm and Particle Swarm Optimization (PSO). We employ an SVM with Gaussian kernel as a fitness function for PSO. The effect of optimized Gabor filter bank was evaluated on 1024 ROIs extracted from a Digital Database for Screening Mammography (DDSM) using four performance measures (i.e., accuracy, area under ROC curve, sensitivity and specificity) for the above mentioned mass classification problems. The results show that the proposed method enhances the performance and reduces the computational cost. Moreover, the Wilcoxon signed rank test over the significance level of 0.05 reveals that the performance difference between the optimized Gabor filter bank and non-optimized Gabor filter bank is statistically significant.
international symposium on visual computing | 2012
Ihsan Ullah; Muhammad Hussain; Hatim Aboalsamh; Ghulam Muhammad; Anwar M. Mirza; George Bebis
Gender recognition from facial images plays an important role in biometric applications. We investigated Dyadic wavelet Transform (DyWT) and Local Binary Pattern (LBP) for gender recognition in this paper. DyWT is a multi-scale image transformation technique that decomposes an image into a number of subbands which separate the features at different scales. On the other hand, LBP is a texture descriptor and represents the local information in a better way. Also, DyWT is a kind of translation invariant wavelet transform that has better potential for detection than DWT (Discrete Wavelet Transform). Employing both DyWT and LBP, we propose a new technique of face representation that performs better for gender recognition. DyWT is based on spline wavelets, we investigated a number of spline wavelets for finding the best spline wavelets for gender recognition. Through a large number of experiments performed on FERET database, we report the best combination of parameters for DyWT and LBP that results in maximum accuracy. The proposed system outperforms the stat-of-the-art gender recognition approaches; it achieves a recognition rate of 99.25% on FERET database.
international conference on systems signals and image processing | 2013
Faten A. Alomar; Ghulam Muhammad; Hatim Aboalsamh; Muhammad Hussain; Anwar M. Mirza; George Bebis
In this paper, multi-scale bandlet and local binary pattern (LBP) based method for gender recognition from faces is proposed. Bandlet is one of the multi-resolution techniques that can adapt the orientation of the edges of the face images, and thereby can better capture the texture of a face image. After extracting bandlet coefficients from face images at different scales, LBP is applied to create a histogram, which is used as the feature to a minimum distance classifier. The experiments are performed using FERET grayscale face database, and the highest accuracy of 99.13% is obtained with the proposed method.
2009 International Conference on Computing, Engineering and Information | 2009
Hatim Aboalsamh; Hassan Mathkour; Ghazy M. R. Assassa; Mona F. M. Mursi
Human face recognition plays a significant role in security applications for access control and real time video surveillance systems, and robotics. Popular approaches for face recognition, such as principal components analysis (PCA), rely on static datasets where training is carried in a batch-mode on a pre-available image set. Real world applications require that the training set be dynamic of evolving nature where within the framework of continuous learning new training images are continuously added to the original set; this would trigger a costly frequent re-computation of the eigen space representation via repeating an entire batch-based training that includes the new images. Incremental PCA methods allow adding new images and updating the PCA representation, and offer the advantage of dispensing with the recently added images after model update. In this paper, various incremental PCA (IPCA) training and relearning strategies are proposed and applied to the candid covariance-free incremental principal component algorithm. The effect of the number of increments and size of the eigen vectors on the correct rate of recognition are studied. The results suggest that batch PCA is inferior to the four considered IPCA1-4, and that all IPCAs are practically equivalent with IPCA3 yielding slightly better results than the other IPCAs.
international symposium on innovations in intelligent systems and applications | 2014
Muhammad Hussain; Sahar Q. Saleh; Hatim Aboalsamh; Ghulam Muhammad; George Bebis
Due to the availability of easy-to-use and powerful image editing tools, the authentication of digital images cannot be taken for granted and it gives rise to non-intrusive forgery detection problem because all imaging devices do not embed watermark. We investigated the detection of copy-move and splicing, the two harmful types of image forgery, using textural properties of images. Tampering distorts the texture micro-patterns in an image and texture descriptors can be employed to detect tampering. We did comparative study to examine the effect of two state-of-the-art best texture descriptors: Multiscale Local Binary Pattern (Multi-LBP) and Multiscale Weber Law Descriptor (Multi-WLD). Multiscale texture descriptors extracted from the chrominance components of an image are passed to Support Vector Machine (SVM) to identify it as authentic or forged. The performance comparison reveals that Multi-WLD performs better than Multi-LBP in detecting copy-move and splicing forgeries. Multi-WLD also outperforms state-of-the-art passive forgery detection techniques.