Graduates: Diman Zad Tootaghaj Danial M.M. Kamani Yu Luo Undergrads: Sahil Mishra Luke Porupski Jeremy Ong Yizhi Huang Jeffery Cao Shengguang Bai


Discovering Triangles in Portraits for Supporting Photographic Creation, S He, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, Aug 2017. Intelligent Portrait Composition Assistance — Integrating Deep-learned Models and Photography Idea Retrieval, F Farhat, MM Kamani, S Mishra, JZ Wang, July 2017. Skeleton Matching with Applications in Severe Weather Detection, MM Kamani, F […]

Leveraging big visual data to predict severe weather conditions

NEWS SOURCEs [] Every year, severe weather endangers millions of people and causes billions of dollars in damage worldwide. But new research from Penn State’s College of Information Sciences and Technology (IST) and AccuWeather has found a way to better predict some of these threats by harnessing the power of big data. […]

Shape matching using skeleton context for automated bow echo detection

Abstract: Severe weather conditions cause enormous amount of damages around the globe. Bow echo patterns in radar images are associated with a number of these destructive thunderstorm conditions such as damaging winds, hail and tornadoes. They are detected manually by meteorologists. In this paper, we propose an automatic framework to detect these patterns with high […]

Thumbnail Generation Engine by Smart Cropping

Given any aspect ratio, oval shape, or automatically AutoThumbGen generates a thumbnail based on the input image. In fact, the most prominent part of the input image is recognized and captured by the app with a proper thumbnail size. The source code is in C. The code has been also embedded in Android via JNI and PHP by […]

Evaluating the Combined Impact of Node Architecture and Cloud Workload Characteristics on Network Traffic and Performance/Cost

Abstract The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network […]

Towards blind detection of low-rate spatial embedding in image steganalysis

Abstract: Steganalysis of least significant bit (LSB) embedded images in spatial domain has been investigated extensively over the past decade and most well-known LSB steganography methods have been shown to be detectable. However, according to the latest findings in the area, two major issues of very low-rate (VLR) embedding and content-adaptive steganography have remained hard […]

Eigenvalues-based LSB steganalysis

Abstract: So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a […]

Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families

Abstract: We propose a novel image steganalysis method, based on singular value decomposition and noise estimation, for the spatial domain LSB embedding families. We first define a content independence parameter, DS, that is calculated for each LSB embedding rate. Next, we estimate the DS curve and use noise estimation to improve the curve approximation accuracy. […]

Risk of attack coefficient effect on availability of adhoc networks

Abstract: Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In […]