Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sajida Parveen is active.

Publication


Featured researches published by Sajida Parveen.


The first computers | 2016

Face Liveness Detection Using Dynamic Local Ternary Pattern (DLTP)

Sajida Parveen; Sharifah Mumtazah Syed Ahmad; Nidaa Hasan Abbas; Wan Azizun Wan Adnan; Marsyita Hanafi; Nadeem Naeem

Face spoofing is considered to be one of the prominent threats to face recognition systems. However, in order to improve the security measures of such biometric systems against deliberate spoof attacks, liveness detection has received significant recent attention from researchers. For this purpose, analysis of facial skin texture properties becomes more popular because of its limited resource requirement and lower processing cost. The traditional method of skin analysis for liveness detection was to use Local Binary Pattern (LBP) and its variants. LBP descriptors are effective, but they may exhibit certain limitations in near uniform patterns. Thus, in this paper, we demonstrate the effectiveness of Local Ternary Pattern (LTP) as an alternative to LBP. In addition, we adopted Dynamic Local Ternary Pattern (DLTP), which eliminates the manual threshold setting in LTP by using Weber’s law. The proposed method was tested rigorously on four facial spoof databases: three are public domain databases and the other is the Universiti Putra Malaysia (UPM) face spoof database, which was compiled through this study. The results obtained from the proposed DLTP texture descriptor attained optimum accuracy and clearly outperformed the reported LBP and LTP texture descriptors.


international conference on artificial intelligence | 2014

The Design and Compilation of a Facial Spoof Database on Various Textures

Sajida Parveen; Sharifah Mumtazah Syed Ahmad; Marsyita Hanafi; Wan Azizun Wan Adnan

Face biometrics plays an important role in various authentication applications. However, one of the main design challenges for an accurate face biometrics is detecting spoof artificial artifacts. The development of robust anti-spoofing algorithm requires for rigorous system training and testing on facial database that includes various possible spoof specimen which reflects different variations of spoofing attacks. Currently, the databases which are used to test face anti-spoofing algorithms are limited in terms of texture variations. Therefore, in this paper, our focus is to introduce a face spoofing database which is compiled from various types of spoofing textures. Our database was collected from 30 different subjects and fake faces were recaptured on various forms which include four different types of paper-based textures and three different digital display devices. All images were collected using a high precision camera device. This database would provide a more realistic and challenging platform for facial anti-spoofing research.


2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA) | 2016

A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform

Nidaa Hasan Abbas; Sharifah Mumtazah Syed Ahmad; Abd Rahman Ramli; Sajida Parveen

This paper introduces a new multi-purpose image watermarking algorithm which based on a hybrid of lifting wavelet transform (LWT) and Arnold transform for copyright protection and image authentication. In the proposed scheme, the original image is first decomposed by LWT into four subbands. Then the robust watermark which is a binary logo image is decomposed by Discrete Wavelet Transform (DWT) as such only the high frequency subband of the watermark are embedded in the low frequency subband of the original image. The fragile watermark is block wise self-generated from the original image and scrambled using Arnold transform which is later embedded in the spatial domain of the robust watermarked image. Self-generated fragile watermark supports self-authentication with high localization, whereas scrambling the fragile watermark increases the security of the algorithm. On the other hand, the lifting scheme approaches have almost one half the amounts of operations compared to the DWT based approaches. The overall system has been tested against various attacks and the results demonstrated that the robust watermark can be decoded successively under each attack. In addition, the proposed algorithm can detect any tampering attempts.


Archive | 2018

Terahertz Communications for 5G and Beyond

Nadeem Naeem; Sajida Parveen; Alyani Ismail

A brief discussion about the exclusive properties and applications of terahertz technology is provided in this chapter. The frequency spectrum terahertz (THz) is also discussed. The applications of terahertz in the field of sensors and terahertz for communications are covered. State-of-the-art literature starting from the early to the latest research conducted is provided and analyzed in terms of the performance of terahertz systems. Terahertz, known as Tera waves or T-waves rather than submillimeter wave, has approximately a fraction of a wavelength less than 30 μm. T-wave is heavily used in sensing and imaging applications, and has no ionization hazards and is an excellent candidate frequency band to defeat the multipaths interference problems for pulse communications. The lower quantum energy of T-waves identifies its potential applications toward near-field imaging, telecommunications, spectroscopy, and sensing, including medical diagnoses and security screening. Identification of DNA signatures including complex real-time molecular dynamics through dielectric resonance is a good example of terahertz spectroscopy instruments nowadays. This concluding chapter will not only address the practical applications of terahertz communications, but also identify the research challenges that lie ahead in terms of terahertz antenna design.


International Journal of Approximate Reasoning | 2017

INFORMATION AND COMMUNICATION TECHNOLOGIES ACCESSIBILITY ISSUES FACED BY VISUAL IMPAIRED PERSONS.

Quratulain Soomro; Sajida Parveen; Nadeem Naeem

Quratulain Soomro 1 , Sajida Parveen 2,* and Nadeem Naeem 3 . 1. IT Department, Quaid-e-awam university of engineering, science and technology, Nawabshah, Pakistan. 2. Computer systems engineering department, Quaid-e-awam university of engineering, science and technology, Nawabshah, Pakistan. 3. Electronic Engineering department, Quaid-e-awam university of engineering, science and technology, Nawabshah, Pakistan ...................................................................................................................... Manuscript Info Abstract ......................... ........................................................................ Manuscript History


International Journal of Approximate Reasoning | 2017

FACIAL VERIFICATION ALONG WITH SPOOF ATTACKS.

Jherna Devi; Sajida Parveen; Nadeem Naeem; NidaHusan Abbas

Jherna Devi 1 , Sajida Parveen 2 , Nadeem Naeem 3 and Nida Husan Abbas 4 . 1. Department of Information Technology, Quaid-e-Awam univertersity of Engineering, Science and Technology, Nawabshah, Pakistan. 2. Department of Computer Systems Engineering, Quaid-e-Awam univertersity of Engineering, Science and Technology, Nawabshah, Pakistan. 3. Department of Electronic Engineering, Quaid-e-Awam univertersity of Engineering, Science and Technology, Nawabshah, Pakistan. 4. Department of Computer and Communication Systems Engineering Universiti Putra Malaysia (UPM), Serdang, 43400, Selangor Darul Ehsan, Malaysia. ...................................................................................................................... Manuscript Info Abstract ......................... ........................................................................ Manuscript History


Current Science | 2015

Face Anti-Spoofing Methods

Sajida Parveen; Sharifah Mumtazah Syed Ahmad; Marsyita Hanafi; Wan Azizun Wan Adnan


Archive | 2016

Texture analysis using local ternary pattern for face anti-spoofing

Sajida Parveen; Sharifah Mumtazah Syed Ahmed; Nidaa Hasan Abbas; Nadeem Naeem; Marsyita Hanafi


International Review on Computers and Software | 2015

DWT and Lifting Wavelet Transform Based Robust Watermarking for Color Image

Nidaa Hasan Abbas; Sharifah Mumtazah Syed Ahmad; Wan Azizun Wan Adnan; Abed Rahman Bin Ramli; Sajida Parveen


International Journal of Approximate Reasoning | 2017

REVIEW ON LOCAL BINARY PATTERN (LBP) TEXTURE DESCRIPTOR AND ITS VARIANTS.

Sajida Parveen; Nadeem Naeem; Jherna Devi

Collaboration


Dive into the Sajida Parveen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marsyita Hanafi

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alyani Ismail

Universiti Putra Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge