Ghazy M. R. Assassa

Learn More
Human face recognition plays a significant role in security applications for access control and real time video surveillance systems, and robotics. Popular approaches for face recognition, such as principal components analysis (PCA), rely on static datasets where training is carried in a batch-mode on a pre-available image set. Real world applications(More)
The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that remains tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale(More)
Software cost estimation is an important activity during software development. There are many sophisticated parametric models for estimating the size, cost, and schedule of Object Oriented (OO) software projects. Several authors assert that a model's predictive accuracy can be improved by calibrating its default parameters to a specific environment.. The(More)
Stream analysis is considered as a crucial component of strategic control over a broad variety of disciplines in business, science and engineering. Stream data is a sequence of observations collected over intervals of time. Each data stream describes a phenomenon. Analysis on Stream data includes discovering trends (or patterns) in a Stream sequence. In the(More)
Data Mining is the process of discovering potentially valuable patterns, associations, trends, sequences and dependencies in data. Data mining techniques can discover information that many traditional business analysis and statistical techniques fail to deliver. In our study, we emphasis on the use of data mining techniques on time series, where mining(More)
—Traditional principal components analysis (PCA) techniques for face recognition are based on batch-mode training using a pre-available image set. Real world applications require that the training set be dynamic of evolving nature where within the framework of continuous learning, new training images are continuously added to the original set; this would(More)
—The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images(More)
The authenticity of the watermarked images under various incidental noise is considered in this paper. The watermark is generated using from the content invariant properties of the image and securely embedded in the selected higher textured blocks of the DCT transform of the image to make them robust to jpeg compression and incidental distortions. Response(More)
  • 1