• Publications
  • Influence
Power control for interference mitigation by evolutionary game theory in uplink NOMA for 5G networks
TLDR
We propose an uplink PC scheme for the users of a power domain NOMA network to mitigate the effect of interference between users. Expand
  • 6
A robust multimedia authentication and restoration scheme in digital photography
TLDR
We propose a robust and imperceptible multimedia authentication and restoration scheme which could invisibly protect the content and also survive the manipulations for later verification and restoration. Expand
  • 5
Age progression by gender-specific 3D aging model
TLDR
We present our 3D gender-specific aging model which automatically produces simulated images at age y by taking only one input image at age x irrespective of the pose and lighting conditions. Expand
  • 2
Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography
TLDR
In the past few years, semi-fragile watermarking techniques have become increasingly important to secure and verify multimedia content and also to localize the tampered areas, while tolerating some non-malicious manipulations or attacks. Expand
  • 7
  • PDF
Workplace Ostracism and Knowledge Hiding: The Mediating Role of Job Tension
This study examined the impact of workplace ostracism on employees’ knowledge hiding behavior. Based on the conservation of resource theory, this study seeks to identify the effects of job tension asExpand
  • 3
  • PDF
Age-invariant face recognition using gender specific 3D aging modeling
TLDR
The age-invariant face recognition (AIFR) is a relatively new area of research in the face recognition domain which has recently gained substantial attention due to its great potential and importance in real-world applications. Expand
  • 2
Automatic segmentation improvement based on parameter-free spectral matting
TLDR
We propose a parameter-free spectral matting technique to automatically achieve essential matting components from the smallest eigenvectors of a Laplacian matrix that accomplish good segmentation results in photography. Expand
  • 1
SAFE-points: a lightweight algorithm for analyzing remote mobile ECG signals
TLDR
In this paper, we present our Select All Fiducially Essential points (SAFE-points) algorithm that uses ECG signal images as an approach for achieving highly efficientECG signal analysis within a mobile environment at a fraction of the associated costs in terms of latency, memory and goodput. Expand
  • 1
Improving face verification using facial marks and deep CNN: IARPA Janus benchmark-A
TLDR
We present our face verification system using facial mark (FM) combined with deep convolutional neural network (DCNN) approach to improve the overall FR accuracy. Expand