Vasif V. Nabiyev

Orcid: 0000-0003-0314-8134

According to our database1, Vasif V. Nabiyev authored at least 53 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A new face presentation attack detection method based on face-weighted multi-color multi-level texture features.
Vis. Comput., March, 2024

2023
Face presentation attack detection performances of facial regions with multi-block LBP features.
Multim. Tools Appl., November, 2023

Comprehensive survey of the solving puzzle problems.
Comput. Sci. Rev., November, 2023

Examination of adaptation components in serious games: a systematic review study.
Educ. Inf. Technol., June, 2023

Color Image Splicing Localization Based on Block Classification Using Transition Probability Matrix.
Wirel. Pers. Commun., April, 2023

Robust Copy-Move Forgery Detection Technique Against Image Degradation and Geometric Distortion Attacks.
Wirel. Pers. Commun., 2023

2022
Ciratefi based copy move forgery detection on digital images.
Multim. Tools Appl., 2022

An end-to-end neural network for detecting hidden people in images based on multiple attention network.
Multim. Tools Appl., 2022

A new approach based on Bezier curves to solve path planning problems for mobile robots.
J. Comput. Sci., 2022

2021
Automatic Retrieval of Shoeprints Using Modified Multi-Block Local Binary Pattern.
Symmetry, 2021

Improved copy move forgery detection method via L*a*b* color space and enhanced localization technique.
Multim. Tools Appl., 2021

Classification of Camouflage Images Using Local Binary Patterns (LBP).
Proceedings of the 29th Signal Processing and Communications Applications Conference, 2021

2019
A novel age classification method using morph-based models.
Int. Arab J. Inf. Technol., 2019

2018
A new facial age estimation method using centrally overlapped block based local texture features.
Multim. Tools Appl., 2018

Frame duplication detection based on BoW model.
Multim. Syst., 2018

Existence of Nash equilibrium in differential Game Approach to formation control.
Int. J. Robotics Autom., 2018

Using correlation matrix to detect frame duplication forgery in videos.
Proceedings of the 26th Signal Processing and Communications Applications Conference, 2018

2017
Medical Image Tamper Detection Based on Passive Image Authentication.
J. Digit. Imaging, 2017

Frame duplication/mirroring detection method with binary features.
IET Image Process., 2017

A fast detection method for frame duplication forgery based on correlation.
Proceedings of the 25th Signal Processing and Communications Applications Conference, 2017

2016
A new approach with score-level fusion for the classification of a speaker age and gender.
Comput. Electr. Eng., 2016

Facial age estimation using spatial Weber Local Descriptor.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

2015
Image forgery detection using colour moments.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Age and gender recognition of a speaker from short-duration phone conversations.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

Image forgery detection based on energy probability.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

Age estimation using hybrid features of facial images.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

A Novel Algorithm for Segmentation of Suspicious Microcalcification Regions on Mammograms.
Proceedings of the Bioinformatics and Biomedical Engineering, 2015

LBP-DCT Based Copy Move Forgery Detection Algorithm.
Proceedings of the Information Sciences and Systems 2015, 2015

Age Estimation Based on Hybrid Features of Facial Images.
Proceedings of the Information Sciences and Systems 2015, 2015

2014
A novel automatic suspicious mass regions identification using Havrda & Charvat entropy and Otsu's N thresholding.
Comput. Methods Programs Biomed., 2014

Comparison of MFCC, LPCC and PLP features for the determination of a speaker's gender.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

Nested compartment secret image sharing scheme.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

Planning of mobile robots under limitted velocity and acceleration.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

A hybrid image authentication method robust to JPEG attacks.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

Comparison of Enhancement Methods for Mammograms with Performance Measures.
Proceedings of the e-Health - For Continuity of Care - Proceedings of MIE2014, the 25th European Medical Informatics Conference, Istanbul, Turkey, August 31, 2014

2013
Secret image sharing scheme with adaptive authentication strength.
Pattern Recognit. Lett., 2013

Invertible secret image sharing for gray level and dithered cover images.
J. Syst. Softw., 2013

Automated pre-diagnosis of Acromegaly disease using Local Binary Patterns and its variants.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

Gender identification of a speaker from voice source.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Copy move forgery detection based on LBP.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

ACromegaly Pre-Diagnosis Based On Principal Component And Linear Discriminant Analysis.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Automatic Microcalcification Segmentation Using Rough Entropy and Fuzzy Approach.
Proceedings of the Information Technology in Bio- and Medical Informatics, 2013

2012
A new casccaded secret image sharing scheme.
Proceedings of the 20th Signal Processing and Communications Applications Conference, 2012

Similarity assessment with local binary patterns.
Proceedings of the 20th Signal Processing and Communications Applications Conference, 2012

Age Estimation Based on Local Radon Features of Facial Images.
Proceedings of the Computer and Information Sciences III, 2012

2011
Distortion free geometry based secret image sharing.
Proceedings of the First World Conference on Information Technology, 2011

Medical image security and EPR hiding using Shamir's secret sharing scheme.
J. Syst. Softw., 2011

Down syndrome recognition using local binary patterns and statistical evaluation of the system.
Expert Syst. Appl., 2011

Improved Secret Image Sharing Method By Encoding Shared Values With Authentication Bits.
Proceedings of the Computer and Information Sciences II, 2011

2009
Score calculation from final tournament tables.
Comput. Oper. Res., 2009

Polynomial approach in a secret image sharing using quadratic residue.
Proceedings of the 24th International Symposium on Computer and Information Sciences, 2009

2008
Tournament scoring problem.
Appl. Math. Comput., 2008

2005
View Distance Based Human Motion Analysis.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2005), 2005


  Loading...