• A combined multiple action recognition and summarization for surveillance video sequences 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya; Bouridane A.; Beghdadi A. ( Springer , 2021 , Article)
      Human action recognition and video summarization represent challenging tasks for several computer vision applications including video surveillance, criminal investigations, and sports applications. For long videos, it is ...
    • A review of deep learning-based detection methods for COVID-19 

      Subramanian, N.; Elharrouss, O.; Al-Maadeed, Somaya; Chowdhury, M. ( Elsevier Ltd , 2022 , Article)
      COVID-19 is a fast-spreading pandemic, and early detection is crucial for stopping the spread of infection. Lung images are used in the detection of coronavirus infection. Chest X-ray (CXR) and computed tomography (CT) ...
    • A review of video surveillance systems 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya ( Academic Press Inc. , 2021 , Article)
      Automated surveillance systems observe the environment utilizing cameras. The observed scenario is then analysed using motion detection, crowd behaviour, individual behaviour, interaction between individuals, crowds and ...
    • An image steganography approach based on k-least significant bits (k-LSB) 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Image steganography is the operation of hiding a message into a cover image. the message can be text, codes, or image. Hiding an image into another is the proposed approach in this paper. Based on LSB coding, a k-LSB-based ...
    • Applications, databases and open computer vision research from drone videos and images: a survey 

      Akbari Y.; Almaadeed N.; Al-Maadeed, Somaya; Elharrouss O. ( Springer Science and Business Media B.V. , 2021 , Article)
      Analyzing videos and images captured by unmanned aerial vehicles or aerial drones is an emerging application attracting significant attention from researchers in various areas of computer vision. Currently, the major ...
    • BEMD-3DCNN-based method for COVID-19 detection 

      Riahi, A.; Elharrouss, O.; Al-Maadeed, Somaya ( Elsevier Ltd , 2022 , Article)
      The coronavirus outbreak continues to spread around the world and no one knows when it will stop. Therefore, from the first day of the identification of the virus in Wuhan, China, scientists have launched numerous research ...
    • DeepWTPCA-L1: A New Deep Face Recognition Model Based on WTPCA-L1 Norm Features 

      Maafiri A.; Elharrouss O.; Rfifi S.; Al-Maadeed, SomayaA.; Chougdali K. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      In this paper, we propose a robust face recognition model called DeepWTPCA-L1 using WTPCA-L1 features and a CNN-LSTM architecture. First, WTPCA-L1 algorithm, composed of Three-level decomposition of discrete wavelet transform ...
    • Drone-SCNet: Scaled Cascade Network for Crowd Counting on Drone Images 

      Elharrouss O.; Almaadeed N.; Abualsaud K.; Al-Ali A.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Crowd management is an essential task to ensure the safety and smoothness of any event. Using novel technologies, including surveillance cameras, drones, and the communication techniques between security agents, the control ...
    • Encoder-decoder architecture for ultrasound IMC segmentation and cIMT measurement 

      Al-Mohannadi A.; Al-Maadeed, Somaya; Elharrouss O.; Sadasivuni K.K. ( MDPI , 2021 , Article)
      Cardiovascular diseases (CVDs) have shown a huge impact on the number of deaths in the world. Thus, common carotid artery (CCA) segmentation and intima-media thickness (IMT) measurements have been significantly implemented ...
    • End-to-End Image Steganography Using Deep Convolutional Autoencoders 

      Subramanian N.; Cheheb I.; Elharrouss O.; Al-Maadeed, Somaya; Bouridane A. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret ...
    • Evolution of Internet of Things from Blockchain to IOTA: A Survey 

      Alshaikhli M.; Elfouly T.; Elharrouss O.; Mohamed A.; Ottakath N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Internet of Things (IoT) is the new paradigm to the scaling nature of things and their elements, interconnected, exchanging data over a network supported with nodes. The Ubiquitous use of tiny devices and embedded sensor ...
    • Face-Fake-Net: The Deep Learning Method for Image Face Anti-Spoofing Detection : 45 

      Alshaikhli M.; Elharrouss O.; Al-Maadeed, Somaya; Bouridane A. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Due to the increasingly growing demand for user identification on cell phones, PCs, laptops, and so on, face anti-spoofing has risen to significance and is an active research area in academia and industry. The detection ...
    • FSC-Set: Counting, Localization of Football Supporters Crowd in the Stadiums 

      Elharrouss O.; Almaadeed N.; Abualsaud K.; Al-Maadeed S.; Al-Ali A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Counting the number of people in a crowd has gained attention in the last decade. Due to its benefit to many applications such as crowd behavior analysis, crowd management, and video surveillance systems, etc. Counting ...
    • Gait recognition for person re-identification 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya; Bouridane A. ( Springer , 2021 , Article)
      Person re-identification across multiple cameras is an essential task in computer vision applications, particularly tracking the same person in different scenes. Gait recognition, which is the recognition based on the ...
    • Image Steganography: A Review of the Recent Advances 

      Subramanian N.; Elharrouss O.; Al-Maadeed, Somaya; Bouridane A. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes. Deep learning technology, ...
    • LFR face dataset:Left-Front-Right dataset for pose-invariant face recognition in the wild 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In this work, a new multitask convolutional neural network (CNN) is proposed aiming for the recognition of face under pose variations. Furthermore, the combination of pose estimation for each corresponding pose in a separate ...
    • Mhad: Multi-human action dataset 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya ( Springer , 2020 , Conference Paper)
      This paper presents a framework for a multi-action recognition method. In this framework, we introduce a new approach to detect and recognize the action of several persons within one scene. Also, considering the scarcity ...
    • Pose-invariant face recognition with multitask cascade networks 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya; Khelifi F. ( Springer Science and Business Media Deutschland GmbH , 2022 , Article)
      In this work, a face recognition method is proposed for face under pose variations using a multitask convolutional neural network (CNN). Furthermore, a pose estimation method followed by a face identification module is ...
    • VisDrone-CC2020: The Vision Meets Drone Crowd Counting Challenge Results 

      Du D.; Wen L.; Zhu P.; Fan H.; Hu Q.; ... more authors ( Springer Science and Business Media Deutschland GmbH , 2020 , Conference Paper)
      Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing ...