Faculty of Computing, Law and Psychology | School of Computing

Prof Sabah Jassim

Professor of Mathematics

Contact me

Professor Sabah Jassim, Head of the Computing Department at the Universit of Buckingham, top UK university for student satisfactionBSc, MSc (Baghdad), PhD (Swansea)

Sabah Jassim has a BSc and an MSc from Baghdad University and a PhD in Mathematics from the University of Wales. He is Professor of Mathematics. He is also a visiting lecturer at City University, London, and Fachhochschule Wedel, Germany.

He is Professor of Mathematics and Computation and teaches various courses at undergraduate and postgraduate level. These include Image Processing, Mathematics and Algorithms. He also supervises research students in the areas of Biometrics – Authentication, Biomedical Image Analysis and Dynamic Encryption.

Tel: +44 (0)1280 828299 / 828322

Selected Publications

  • H. Al-Assam, H. Sellahewa & S. Jassim, “Accuracy and security evaluation of multi-factor biometric authentication”, International Journal for Information Security Research 1.1 (March 2011), 11-19
  • Harin Sellahewa & Sabah Jassim, “Image quality-based adaptive illumination normalisation for face recognition”
  • H. Sellahewa & S.A. Jassim, “Image-quality-based adaptive face recognition”
  • Maysson Ibrahim et al., “A topology-based score for pathway enrichment”
  • Hongbo Du, Sabah Jassim et al., “Effects of Attribute Selection Measures and Sampling Policies on Functional Structures of Decision Trees”
  • T. Kuseler, H. Al-Assam, S.A. Jassim & I.A. Lami, “Privacy preserving, real-time and location secured biometrics for mCommerce authentication”, Proc.Mobile Multimedia/Image Processing, Security, and Applications, SPIE 80630G (May 2011)
  • W. Hussein, H. Sellahewa & S.A. Jassim, “Block error correction codes for face recognition”
  • H. Al-Assam, H. Sellahewa, S. Jassim, “A secure wavelet-based isometric projection for face recognition”, Proc. Mobile Multimedia/Image Processing, Security, and Applications 2011, SPIE 80630U (May 2011)
  • I. Lami, T. Kuseler, H. Al-Assam & S. Jassim, “LocBiometrics: Mobile phone based multifactor biometric authentication with time and location assurance”, Proc. 18th Telecommunications Forum TELFOR 2010, 151-154
  • H. Al-Assam, H. Sellahewa & S. Jassim, “Multi-Factor Biometrics for Authentication: A false sense of security”, Proc. ACM SIGMM Multimedia and Security Workshop (2010), 81–88
  • Ahmad B., A. Hassanat, & S. Jassim “Color-based lip Localization Method”
  • Ahmad B., A. Hassanat & Sabah Jassim “Visual words for lip-reading”
  • T. Kuseler, I. Lami, S. Jassim & H. Sellahewa, “eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices”
  • S.A. Jassim, H. Al-Assam & H. Sellahewa, “Improving Performance and Security of Biometrics Using Efficient and Stable Random Projection Techniques”, Proc. 6th International Symposium on Image and Signal Processing and Analysis (Sep. 2009), 556-561
  • H. Al-Assam, H. Sellahewa & S. A. Jassim, “A lightweight approach for biometric template protection”, Proc. Mobile Multimedia/Image Processing, Security, and Applications, SPIE 73510P (April 2009)
  • A.J. Abboud, H. Sellahewa & S.A. Jassim, “Image quality approach for adaptive face recognition”
  • A. Al-Sherbaz, C. Adams & S. Jassim, “WiMAX-WiFi convergence with OFDM bridge”
  • H. Sellahewa & S.A. Jassim, “Illumination and Expression Invariant Face Recognition: Toward Sample Quality-based Adaptive Fusion”
  • Ali Al-Sherbaz, Chris Adams & Sabah Jassim, “Private synchronization technique for heterogeneous wireless network (WiFi and WiMAX)”
  • Fanzhi Li, Ali Al-Sherbaz, Chris Adams & Sabah Jassim, “Credibility based secure route finding in wireless ad hoc networks”
  • H. Sellahewa, S. Jassim et al., “Global Features for Rapid Identity Verification with Dynamic Biometric Data”
  • S.A. Jassim & H. Sellahewa, “Multi-stream face recognition for crime-fighting”
  • J.H. Ehlers & S. Jassim, “A wavelet library for constrained devices”
  • F. Li & S. Jassim, “Detecting and Isolating Malicious Nodes in Wireless Ad Hoc Networks”
  • A.J. Abboud & S.A. Jassim, “Biometric templates selection and update using quality measures”
  • W. Hussein, H. Sellahewa & S.A. Jassim, “Adaptive error correction codes for face recognition”
  • M. Maliki, S.A. Jassim, N. Al-Jawad & H. Sellahewa, “Arabic handwritten: pre-processing and segmentation”
  • A.J. Abboud & S.A. Jassim, “Incremental fusion of partial biometric information”
  • H. Al-Assam, A. Abboud, H. Sellahewa & S. Jassim, “Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion”, in Yun Q. Shi (ed.), Transactions on Data Hiding and Multimedia Security VIII (LNCS 7228, 2012), 1-18
  • H. Al-Assam & S. Jassim, “Security evaluation of biometric keys”, Computer & Security 31.2 (March 2012), 151–163
  • M. Maliki, S.A. Jassim & N. Al-Jawad, “Arabic writer identification based on diacritic’s features”
  • A. Al-Sherbaz, S. Jassim, C. Adams & I.A. Lami, “Routing and node addressing in wireless mesh networks”
  • H. Al-Assam, A. Abboud & S. Jassim, “Hidden Assumption of Face Recognition Evaluation under Different Quality Conditions”, Proc. Information Society (i-Society) (June 2011), 27-32
  • H. Al-Assam, A. Abboud & S. Jassim, “Exploiting Samples Quality in Evaluating and Improving Performance of Biometric Systems”, International Journal of Digital Society 2.2 (June 2011), 462-468
  • H. Al-Assam & S.A. Jassim, “Multi-factor challenge / response approach for remote biometric authentication”, Proc. Mobile Multimedia / Image Processing, Security, and Applications 2011, SPIE 80630V (May 2011)
  • N. Al-Jawad & S. Jassim, “Wavelet Based Image Quality Self Measurements”
  • Sabah Jassim, Harin Sellahewa at al., “Multi-modal biometric authentication on the SecurePhone PDA”
  • Harin Sellahewa, Sabah Jassim et al., “Nonintrusive multibiometrics on a mobile device: a comparison of fusion techniques”
  • Harin Sellahewa, Naseer Al-Jawad, Sahan Jassim et al., “Comparison of weighting strategies in early and late fusion approaches to audio-visual person authentication”
  • Harin Sellahewa & Sabah Jassim, “Performance evaluation of wavelet-based face verification on a PDA-recorded database”
  • Sabah Jassim, Harin Sellahewa et al., “Multimodal person authentication on a smartphone under realistic conditions”
  • Sabah Jassim, Chris Adams et al., “The effect of malicious nodes on the performance of mobile ad hoc networks”
  • Sabah Jassim et al., “The Securephone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly”
  • Naseer Al-Jawad, Sabah Jassim et al., “An efficient real-time video compression algorithm with high feature preserving capability”
  • Naseer Al-Jawad, Hongbo Du, Sabah Jassim et al., “Content-based video indexing and searching with wavelet transform”
  • Sabah Jassim, Harin Sellahewa et al., “Wavelet-based face verification for mobile personal devices”
  • Harin Sellahewa & Sabah Jassim, “Face recognition in the presence of expression and/or illumination variation”
  • Sabah Jassim & Harin Sellahewa, “A wavelet-based approach to face verification/recognition”
  • Harin Sellahewa & Sabah Jassim, “Wavelet-based face verification for constrained platforms”
  • Sabah Jassim & Harin Sellahewa, “Face verification schemes for mobile personal devices”
  • Naseer Al-Jawad & Sabah Jassim, “Feature-preserving image/video compression”
  • Sabah Jassim et al., “Filters ranking for DWT-domain robust digital watermarking”
  • Sabah Jassim, Chris Adams et al., “A non-uniform wavelet-based video/image compression technique”
  • Sabah Jassim et al., “The choice of filter banks for wavelet-based robust digital watermarking”
  • Sabah Jassim, Hongbo Du et al., “A comparative study of selection measures on decision tree structures”
  • R.D. Rashid, S.A. Jassim & H. Sellahewa, “Biometric feature embedding using robust steganography technique”
  • A.A. Abdulla, H. Sellahewa and S.A. Jassim, “Efficient high-capacity steganography techniques”
  • N. Al-Hassan, H. Sellahewa & S.A. Jassim, “Super resolution based face recognition: do we need training image set?”
  • A. Sabir, N. Al-Jawad & S.A. Jassim, “Gait recognition using spatio-temporal silhouette-base features”
  • Nadia Al-Hassan, Sabah Jassim & Harin Sellahewa, “Enhancing face recognition at a distance using super resolution”, Proceedings of the 14th ACM Workshop on Multimedia and Security (2012), 123-132
  • R.D. Rashid, S.A. Jassim & H. Sellahewa, “LBP Based on Multi Wavelet Sub-Bands Feature Extraction used for Face Recognition”
  • N. Al-Hassan, S.A. Jassim & H. Sellahewa, “Construction of Dictionaries to Reconstruct High-Resolution Images for Face Recognition”
  • M. Maliki, N. Al-Jawad & S.A. Jassim, “Sub-word-based Arabic handwriting analysis for writer identification”
  • A.A. Abdulla, S.A. Jassim and H. Sellahewa, “Secure Steganography Technique Based on Bitplane Indexes”
  • R.D. Rashid, S.A. Jassim & H. Sellahewa, “Covert Exchange of Face Biometric Data using Steganography”
  • A. Al-Talabani, H. Sellahewa & S. Jassim, “Excitation Source and Low Level Descriptor Features Fusion for Emotion Recognition using SVM and ANN”
  • H. Al-Assam, R. Rashid & S. Jassim, “Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange”
  • S.A. Jassim, “Face recognition from degraded images”
  • A. Sabir, N. Al-Jawad, S. Jassim, A. Al-Talabani, “Human gait gender classification based on fusing spatio-temporal and wavelet statistical features”
  • M.A.-R. Ibrahim, S. Jassim, M.A. Cawthome, K. Langlands, “Pathway-based gene selection for disease classification”
  • H. Al-Assam, H. Du, S. Jassim et al., “Automatic segmentation and classification of gestational sac based on mean sac diameter using medical ultrasound image”, SPIE Conference on Multimedia/Image Processing, Security and Applications (Baltimore, USA, May 2014)
  • S. Khazendar, J. Farren, H. Al-Assam, A. Sayasneh, H. Du, T. Bourne & S.A. Jassim, “Automatic Identification of Early Miscarriage Based on Multiple Features Extracted from Ultrasound Images”, Proc. 18th Annual Conference in Medical Image Understanding and Analysis (MIUA, 2014), 131-136
  • N. Al-Hayani, N. Al-Jawad & S.A. Jassim, “Simultaneous compression and encryption for secure real-time secure transmission of sensitive video transmission”, Proc. Mobile Multimedia / Image Processing, Security, and Applications (SPIE 9120, 91200J, May 2014)
  • A.A. Abdulla, H. Sellahewa & S.A. Jassim, “Steganography based on pixel intensity value decomposition”, Proc. Mobile Multimedia / Image Processing, Security, and Applications (SPIE 9120, 912005, May 2014)
  • N. Al-Hayani, N. Al-Jawad & S. Jassim, “Simultaneous edge sensing compression and encryption for real-time video transmission”, Proc. Real-Time Image and Video Processing (SPIE 9139, 91390F, May 2014)
  • A. Sabir, N. Al-Jawad & S. Jassim, “Feature selection gait-based gender classification under different circumstances”, Proc. Real-Time Image and Video Processing (SPIE 9139, 91390A, May 2014)
  • A.A. Abdulla, H. Sellahewa & S.A. Jassim, “Stego quality enhancement by message size reduction and fibonacci bit-plane mapping”, Lecture Notes in Computer Science 8893 (2014), pp.151-166
  • S. Khazendar, H. Al-Assam, H. Du, S. Jassim, A. Sayasneh, T. Bourne, J.Kajiser, and D. Timmerman, “Automated Classification of Static Ultrasound Images of Ovarian Tumours Based on Decision Level Fusion”, Sixth International Conference on Computer Science and Electronic Engineering Conference (CEEC 2014), 148-153
  • S. Khazendar, A. Sayasneh, H. Al-Assam, H. Du, J. Kaijser, L. Ferrara, D. Timmerman, S. Jassim & T. Bourne, “Automated characterisation of ultrasound images of ovarian tumours: the diagnostic accuracy of a support vector machine and image processing with a local binary pattern operator”, Facts, Views and Visions in ObGyn 7.1 (March 2015), 7-15
  • A. Al-Talabani, H. Sellahewa & S.A. Jassim, “Emotion recognition from speech: Tools and challenges”, Proc. SPIE 9497, Mobile Multimedia/Image Processing, Security, and Applications 2015, 94970N, April 2015
  • H. Al-Assam, T. Kuseler, S. Jassim & S. Zeadally, “Privacy in Biometric Systems”, in S. Zeadally & M. Badra (eds), Privacy in a Digital, Networked World: Technologies, Implications and Solutions (Springer, 2015), 235-263
  • D. Ahmed Ibrahim, H. Al-Assam, H. Du, D. Al-karawi, S. Jassim et al., “Automatic segmentation and measurements of gestational sac using static B-mode ultrasound images”, Proc. SPIE 9869, Mobile Multimedia/Image Processing, Security, and Applications 2016
  • D. Han, H. Du & S. Jassim, “Towards a Confidence-Centric Classification Based on Gaussian Models and Bayesian Principles”, Proceedings of 9th York Doctoral Symposium on Computer Science and Electronics (University of York, November 2016), 46-56
  • A. Alazeez, S. Jassim & H. Du, “EINCKM: An Enhanced Prototype-based Method for Clustering Evolving Data Streams in Big Data”, Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2017) (Porto, February 2017), 173-183
  • T. Albaidhani, C. Hawkes, S. Jassim & H. Al-Assam, “Automatic detection of the hippocampal region associated with Alzheimer’s disease from microscopic images of mice brain”, Proc. SPIE, Mobile Multimedia/Image Processing, Security, and Applications, 98690D (Baltimore, May 2016)
  • S. Hussein, J. Selway, S. Jassim and H. Al-Assam, “Automatic layer segmentation of H&E microscopic images of mice skin”, Proc. SPIE, Mobile Multimedia/Image Processing, Security, and Applications, 98690C (Baltimore, May 2016)
  • S. Hussein, S. Jassim & H Al-Assam, “Automatic Quantification of Epidermis Curvature in H&E Stained Microscopic Skin Image of Mice”, MIUA 2017: Medical Image Understanding and Analysis (July 2017, CCIS Series vol. 723), 935-945
  • D. Ibrahim, H. Al-Assam, S. Jassim & H. Du, “Multi-level Trainable Segmentation for Measuring Gestational and Yolk Sacs from Ultrasound Images“, MIUA 2017: Medical Image Understanding and Analysis (July 2017, CCIS Series vol. 723), 86-97
  • D. Al-Karawi, A. Sayasneh, H. Al-Assam, S. Jassim, N. Page, D. Timmerman, T. Bourne & H. Du, “Automated differentiation of ovarian mature teratomas from other benign tumours using neural networks classification of 2D ultrasound static images”, Proc. SPIE, Mobile Multimedia/Image Processing, Security, and Applications (May 2017), pp.102210F-102210F-10
  • D. Ibrahim, H. Al-Assam, H. Du & S. Jassim, “Trainable segmentation of multilocular cysts based on local basic pixel features”, Proc. SPIE, Mobile Multimedia/Image Processing, Security, and Applications (May 2017), pp.102210B-102210B-8
  • T. Albaidhani, S. Jassim & H. Al-Assam, “Computer aided solution for segmenting the neuron line in hippocampal microscope images”, Proc. SPIE, Mobile Multimedia/Image Processing, Security, and Applications (May 2017), pp.1022109-1022109-8
  • A. Asaad & S. Jassim, “Topological Data Analysis for Image Quality Assessment”, in Digital Forensics and Watermarking, Proceedings of 16th International Workshop, IWDW 2017 (Magdeburg, Germany, August 23-25, 2017)
  • A. Asaad, R.D. Rashid & S. Jassim, “Topological Image Texture Analysis for Quality Assessment”, Proc. SPIE, Mobile Multimedia/Image Processing, Security, and Applications (May 2017), pp. 102210I
  • A. Al Abd Alazeez, S. Jassim and H. Du, “EDDS: An Enhanced Density-based Method for Clustering Data Streams”, Proceedings of 46th International Conference on Parallel Processing Workshops, University of Bristol, August 2017, DOI 10.1109/ICPPW.2017.27, pp103-112
  • A.Al Abd Alazeez, S. Jassim and H. Du, “TPICDS: A Two-Phase Parallel Approach for Incremental Clustering of Data Streams”, Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers, Lecture Notes in Computer Science by Springer International Publishing, Vol. 11339, No.1, January 2019, pp5-16, DOI: 10.1007/978-3-030-10549-5
  • A. A. A. Alazeez, S. Jassim and H. Du, “SLDPC: Towards Second Order Learning for Detecting Persistent Clusters in Data Streams,” 2018 10th Computer Science and Electronic Engineering (CEEC), Colchester, United Kingdom, 2018, pp. 248-253.
<< Back to the directory