Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

portfolio

publications

Band and Quality Selection for Efficient Transmission of Hyperspectral Images

Published in ACM Multimedia, 2019

This paper presents a method to prioritize the transmission of various components of hyperspectral data based on the application needs, the level of details required, and available bandwidth.

Recommended citation: M. Arab, et al. 2019. Band and Quality Selection for Efficient Transmission of Hyperspectral Images. In Proceedings of the 27th ACM International Conference on Multimedia. https://dl.acm.org/doi/10.1145/3343031.3351047

Revealing True Identity: Detecting Makeup Attacks in Face-based Biometric Systems

Published in ACM Multimedia, 2020

This paper proposes a novel solution to address makeup attacks, which are the hardest to detect in such systems because makeup can substantially alter the facial features of a person, including making them appear older/younger by adding/hiding wrinkles, modifying the shape of eyebrows, beard, and moustache, and changing the color of lips and cheeks.

Recommended citation: M. Arab, et al. 2020. Revealing True Identity: Detecting Makeup Attacks in Face-based Biometric Systems. In Proceedings of the 28th ACM International Conference on Multimedia. https://dl.acm.org/doi/10.1145/3394171.3413606

FlexMark: Adaptive Watermarking Method for Images

Published in ACM Multimedia Systems, 2024

We proposed a flexible watermarking method that can be used in different scenarios from copyright protection to data hiding.

Recommended citation: M. Arab, et al. 2024. FlexMark: Adaptive Watermarking Method for Images. In Proceedings of the 15th ACM Multimedia Systems Conference.

RDIAS: Robust and decentralized image authentication system

Published in ACM Transactions on Multimedia Computing, Communications and Applications, 2025

This paper presents RDIAS, a robust and decentralized image authentication system designed to withstand sophisticated AI-powered manipulations while tolerating common platform transformations such as resizing and transcoding. RDIAS embeds secure, semantic fingerprints directly into images using perceptual hashing, deep-learning-based watermarking, and error-correcting codes. Extensive evaluations with realistic AI attacks demonstrate up to 99% accuracy in detecting manipulated images while preserving visual quality and enabling real-time verification.

Recommended citation: Ghorbanpour, Ali, Mohammad Amin Arab, and Mohamed Hefeeda. "RDIAS: Robust and decentralized image authentication system." ACM Transactions on Multimedia Computing, Communications and Applications 21.10 (2025): 1-28.

ImageShield: A System for Image Tampering Detection, Localization, and Recovery

Published in , 1900

This paper introduces ImageShield, an end-to-end system for image authentication, tampering localization, and semantic content recovery that is robust against advanced AI-enabled attacks. ImageShield employs a novel dual-embedding strategy that separately embeds cryptographically protected authentication data and high-capacity recovery information using specialized neural networks. Extensive experiments and a human user study demonstrate that ImageShield significantly outperforms prior state-of-the-art methods in robustness, localization accuracy, and restored image quality under realistic attacks and transformations.

talks

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.