Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sabah Jassim is active.

Publication


Featured researches published by Sabah Jassim.


IEEE Transactions on Instrumentation and Measurement | 2010

Image-Quality-Based Adaptive Face Recognition

Harin Sellahewa; Sabah Jassim

The accuracy of automated face recognition systems is greatly affected by intraclass variations between enrollment and identification stages. In particular, changes in lighting conditions is a major contributor to these variations. Common approaches to address the effects of varying lighting conditions include preprocessing face images to normalize intraclass variations and the use of illumination invariant face descriptors. Histogram equalization is a widely used technique in face recognition to normalize variations in illumination. However, normalizing well-lit face images could lead to a decrease in recognition accuracy. The multiresolution property of wavelet transforms is used in face recognition to extract facial feature descriptors at different scales and frequencies. The high-frequency wavelet subbands have shown to provide illumination-invariant face descriptors. However, the approximation wavelet subbands have shown to be a better feature representation for well-lit face images. Fusion of match scores from low- and high-frequency-based face representations have shown to improve recognition accuracy under varying lighting conditions. However, the selection of fusion parameters for different lighting conditions remains unsolved. Motivated by these observations, this paper presents adaptive approaches to face recognition to overcome the adverse effects of varying lighting conditions. Image quality, which is measured in terms of luminance distortion in comparison to a known reference image, will be used as the base for adapting the application of global and region illumination normalization procedures. Image quality is also used to adaptively select fusion parameters for wavelet-based multistream face recognition.


Adipocyte | 2013

A novel automated image analysis method for accurate adipocyte quantification.

Osman S. Osman; Joanne L. Selway; Malgorzata A. Kępczyńska; Claire J. Stocker; Jacqueline F. O’Dowd; Michael A. Cawthorne; Jonathan R.S. Arch; Sabah Jassim; Kenneth Langlands

Increased adipocyte size and number are associated with many of the adverse effects observed in metabolic disease states. While methods to quantify such changes in the adipocyte are of scientific and clinical interest, manual methods to determine adipocyte size are both laborious and intractable to large scale investigations. Moreover, existing computational methods are not fully automated. We, therefore, developed a novel automatic method to provide accurate measurements of the cross-sectional area of adipocytes in histological sections, allowing rapid high-throughput quantification of fat cell size and number. Photomicrographs of H&E-stained paraffin sections of murine gonadal adipose were transformed using standard image processing/analysis algorithms to reduce background and enhance edge-detection. This allowed the isolation of individual adipocytes from which their area could be calculated. Performance was compared with manual measurements made from the same images, in which adipocyte area was calculated from estimates of the major and minor axes of individual adipocytes. Both methods identified an increase in mean adipocyte size in a murine model of obesity, with good concordance, although the calculation used to identify cell area from manual measurements was found to consistently over-estimate cell size. Here we report an accurate method to determine adipocyte area in histological sections that provides a considerable time saving over manual methods.


Proceedings of SPIE | 2009

A lightweight approach for biometric template protection

Hisham Al-Assam; Harin Sellahewa; Sabah Jassim

Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.


BMC Bioinformatics | 2013

A novel method to assess collagen architecture in skin

Osman S. Osman; Joanne L. Selway; Parvathy E. Harikumar; Claire J. Stocker; Edward T. Wargent; Michael A. Cawthorne; Sabah Jassim; Kenneth Langlands

BackgroundTexture within biological specimens may reveal critical insights, while being very difficult to quantify. This is a particular problem in histological analysis. For example, cross-polar images of picrosirius stained skin reveal exquisite structure, allowing changes in the basketweave conformation of healthy collagen to be assessed. Existing techniques measure gross pathological changes, such as fibrosis, but are not sufficiently sensitive to detect more subtle and progressive pathological changes in the dermis, such as those seen in ageing. Moreover, screening methods for cutaneous therapeutics require accurate, unsupervised and high-throughput image analysis techniques.ResultsBy analyzing spectra of images post Gabor filtering and Fast Fourier Transform, we were able to measure subtle changes in collagen fibre orientation intractable to existing techniques. We detected the progressive loss of collagen basketweave structure in a series of chronologically aged skin samples, as well as in skin derived from a model of type 2 diabetes mellitus.ConclusionsWe describe a novel bioimaging approach with implications for the evaluation of pathology in a broader range of biological situations.


Proceedings of SPIE, the International Society for Optical Engineering | 2006

Nonintrusive multibiometrics on a mobile device: a comparison of fusion techniques

Lorene Allano; Andrew C. Morris; Harin Sellahewa; Sonia Garcia-Salicetti; Jacques Koreman; Sabah Jassim; Bao Ly-Van; Dalei Wu; Bernadette Dorizzi

In this article we test a number of score fusion methods for the purpose of multimodal biometric authentication. These tests were made for the SecurePhone project, whose aim is to develop a prototype mobile communication system enabling biometrically authenticated users to deal legally binding m-contracts during a mobile phone call on a PDA. The three biometrics of voice, face and signature were selected because they are all traditional non-intrusive and easy to use means of authentication which can readily be captured on a PDA. By combining multiple biometrics of relatively low security it may be possible to obtain a combined level of security which is at least as high as that provided by a PIN or handwritten signature, traditionally used for user authentication. As the relative success of different fusion methods depends on the database used and tests made, the database we used was recorded on a suitable PDA (the Qtek2020) and the test protocol was designed to reflect the intended application scenario, which is expected to use short text prompts. Not all of the fusion methods tested are original. They were selected for their suitability for implementation within the constraints imposed by the application. All of the methods tested are based on fusion of the match scores output by each modality. Though computationally simple, the methods tested have shown very promising results. All of the 4 fusion methods tested obtain a significant performance increase.


2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis | 2009

Improving performance and security of biometrics using efficient and stable random projection techniques

Sabah Jassim; Hisham Al-Assam; Harin Sellahewa

The challenges in biometrics research activities have expanded recently to include the maintenance of security and privacy of biometric templates beside the traditional work to improve accuracy, speed, and robustness. Revocable biometric templates and biometric cryptosystems have been developed as template protection measures. Revocability means that biometric templates could be revoked in the same way as lost or stolen credit cards are, while biometric cryptosystems aim to generate biometric keys and hashes to be used as proof of identity. Recently developed biometric protection schemes involve the use of random projections (RP) onto secret personalised domains. In this paper, we propose a novel and efficient orthonormal RP scheme to be used for the generation of revocable biometrics. We shall demonstrate the result of applying our RP transforms on face biometrics and compare its efficiency with that of the widely used RP technique based on the Gram-Schmidt process. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transformed face images. Some security analysis of our scheme will also be presented.


Journal of Computational Biology | 2012

A Topology-Based Score for Pathway Enrichment

Maysson Al-Haj Ibrahim; Sabah Jassim; Michael A. Cawthorne; Kenneth Langlands

Investigators require intuitive tools to rationalize complex datasets generated by transcriptional profiling experiments. Pathway analysis methods, in which differentially expressed genes are mapped to databases of reference pathways to facilitate assessment of relative enrichment, lead investigators more effectively to biologically testable hypotheses. However, once a set of differentially expressed genes is isolated, pathway analysis approaches tend to ignore rich gene expression information and, moreover, do not exploit relationships between transcripts. In this article, we report the development of a new method in which both pathway topology and the magnitude of gene expression changes inform the scoring system, thereby providing a powerful filter in the enrichment of biologically relevant information. When four sample datasets were evaluated with this method, literature mining confirmed that those pathways germane to the physiological process under investigation were highlighted by our method relative to z-score overrepresentation calculations. Moreover, non-relevant processes were downgraded using the method described herein. The inclusion of expression and topological data in the calculation of a pathway regulation score (PRS) facilitated discrimination of key processes in real biological datasets. Specifically, by combining fold-change data for those transcripts exceeding a significance threshold, and by taking into account the potential for altered gene expression to impact upon downstream transcription, one may readily identify those pathways most relevant to pathophysiological processes.


Computers & Security | 2012

Security evaluation of biometric keys

Hisham Al-Assam; Sabah Jassim

Biometric cryptosystems combine biometrics with cryptography by producing Biometric Cryptographic Keys (BCKs) to provide stronger security mechanisms while protecting against identity theft. The process of generating/binding biometric keys consists of a number of steps starting with a feature extraction procedure, the complexity of which depends on the specific biometric trait/scheme, followed often by user selected transformation to allow for revocability, and an error correction scheme to tolerate reasonable amount of intra-class variation. Each of these steps has its own effect on the security of the generated/bound key. Proper security evaluation must include thorough analysis of the security effect of each of these steps. We propose a comprehensive approach to BCKs security evaluation that takes into consideration each of the steps involved in their construction. We first review existing BCKs and highlight that the analysis of their security is either insufficient or not provided. In addition to evaluating the correctness (i.e. error rates), and the generated/bound key size, we evaluate the randomness of biometric features employed in the process of key generation. Our proposal combines the Kullback-Leibler divergence and the discrimination entropy to formulate a new measure of the Entropy of Biometric Features (EBF), defined as the average number of bits that distinguishes a user from a given population. Then we rigorously evaluate the impact of using error correcting scheme on the security of BCKs to calculate the Effective Entropy of Biometric Features (EEBF). Finally, inherent individual differences of the EBFs will be discussed. Here, we focus on face-based BCKs, but this does not restrict the use of the proposed evaluation. This paper argues that current face-based BCKs are not secure enough for high level security applications, and demonstrates that the average EEBF of BCKs using PCA-based facial features is less than 20-bit even when applying a user-based randomization on biometric features.


international conference on biometrics theory applications and systems | 2008

Illumination and Expression Invariant Face Recognition: Toward Sample Quality-based Adaptive Fusion

Harin Sellahewa; Sabah Jassim

The performance of face recognition schemes is adversely affected as a result of significant to moderate variation in illumination, pose, and facial expressions. Most existing approaches to face recognition tend to deal with one of these problems by controlling the other conditions. Beside strong efficiency requirements, face recognition systems on constrained mobile devices and PDAs are expected to be robust against all variations in recording conditions that arise naturally as a result of the way such devices are used. Wavelet-based face recognition schemes have been shown to meet well the efficiency requirements. Wavelet transforms decompose face images into different frequency subbands at different scales, each giving rise to different representation of the face, and thereby providing the ingredients for a multi-stream approach to face recognition which stand a real chance of achieving acceptable level of robustness. This paper is concerned with the best fusion strategy for a multi-stream face recognition scheme. By investigating the robustness of different wavelet subbands against variation in lighting conditions and expressions, we shall demonstrate the shortcomings of current non-adaptive fusion strategies and argue for the need to develop an image quality based, intelligent, dynamic fusion strategy.


Biometric technology for human identification. Conference | 2005

Wavelet-based face verification for constrained platforms

Harin Sellahewa; Sabah Jassim

Human Identification based on facial images is one of the most challenging tasks in comparison to identification based on other biometric features such as fingerprints, palm prints or iris. Facial recognition is the most natural and suitable method of identification for security related applications. This paper is concerned with wavelet-based schemes for efficient face verification suitable for implementation on devices that are constrained in memory size and computational power such as PDA’s and smartcards. Beside minimal storage requirements we should apply as few as possible pre-processing procedures that are often needed to deal with variation in recoding conditions. We propose the LL-coefficients wavelet-transformed face images as the feature vectors for face verification, and compare its performance of PCA applied in the LL-subband at levels 3,4 and 5. We shall also compare the performance of various versions of our scheme, with those of well-established PCA face verification schemes on the BANCA database as well as the ORL database. In many cases, the wavelet-only feature vector scheme has the best performance while maintaining efficacy and requiring minimal pre-processing steps. The significance of these results is their efficiency and suitability for platforms of constrained computational power and storage capacity (e.g. smartcards). Moreover, working at or beyond level 3 LL-subband results in robustness against high rate compression and noise interference.

Collaboration


Dive into the Sabah Jassim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hongbo Du

University of Buckingham

View shared research outputs
Top Co-Authors

Avatar

Sos S. Agaian

University of Texas at San Antonio

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ali J. Abboud

University of Buckingham

View shared research outputs
Top Co-Authors

Avatar

Chris Adams

University of Buckingham

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge