フォロー
Sani M. Abdullahi
タイトル
引用先
引用先
DeepFake detection for human face images and videos: A survey
A Malik, M Kuribayashi, SM Abdullahi, AN Khan
Ieee Access 10, 18757-18775, 2022
1502022
Fractal coding-based robust and alignment-free fingerprint image hashing
SM Abdullahi, H Wang, T Li
IEEE Transactions on Information Forensics and Security 15, 2587-2601, 2020
692020
Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection
J Li, H Wang, P He, SM Abdullahi, B Li
Digital Signal Processing 120, 103256, 2022
252022
Robust blind video watermarking against geometric deformations and online video sharing platform processing
M He, H Wang, F Zhang, SM Abdullahi, L Yang
IEEE Transactions on Dependable and Secure Computing 20 (6), 4702-4718, 2022
212022
Biometric template attacks and recent protection mechanisms: A survey
SM Abdullahi, S Sun, B Wang, N Wei, H Wang
Information Fusion 103, 102144, 2024
162024
Constructing immunized stego-image for secure steganography via artificial immune system
W Li, H Wang, Y Chen, SM Abdullahi, J Luo
IEEE Transactions on Multimedia 25, 8320-8333, 2023
162023
Light-FireNet: An efficient lightweight network for fire detection in diverse environments
O Khudayberdiev, J Zhang, SM Abdullahi, S Zhang
Multimedia Tools and Applications 81 (17), 24553-24572, 2022
162022
Reversible data hiding with multiple data for multiple users in an encrypted image
A Malik, H Wang, H Wu, SM Abdullahi
International Journal of Digital Crime and Forensics (IJDCF) 11 (1), 46-61, 2019
142019
Dataset mismatched steganalysis using subdomain adaptation with guiding feature
L Zhang, SM Abdullahi, P He, H Wang
Telecommunication Systems 80 (2), 263-276, 2022
112022
High-capacity reversible data hiding in encrypted images using multi-layer embedding
A Malik, P He, H Wang, AN Khan, S Pirasteh, SM Abdullahi
IEEE Access 8, 148997-149010, 2020
112020
Cancelable fingerprint template construction using vector permutation and shift-ordering
SM Abdullahi, K Lv, S Sun, H Wang
IEEE Transactions on Dependable and Secure Computing 20 (5), 3828-3844, 2022
92022
Identification of electronic disguised voices in the noisy environment
W Cao, H Wang, H Zhao, Q Qian, SM Abdullahi
International Workshop on Digital Watermarking, 75-87, 2016
72016
Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals
SM Abdullahi, H Wang
Multimedia Tools and Applications 77, 20753-20782, 2018
62018
Fingerprint image hashing based on minutiae points and shape context
SM Abdullahi, H Wang, A Malik
Digital Forensics and Forensic Investigations: Breakthroughs in Research and …, 2020
52020
The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy
SM Abdullahi, S Sun, H Wang, B Wang
Pattern Recognition Letters 172, 221-229, 2023
42023
A hybrid BTP approach with filtered BCH codes for improved performance and security
SM Abdullahi, S Sun, Y Wang, PP Yang, HZ Wang, B Wang
Journal of Information Security and Applications 71, 103355, 2022
42022
Fourier-Mellin transform and fractal coding for secure and robust fingerprint image hashing
SM Abdullahi, H Wang
2018 15th IEEE International Conference on Advanced Video and Signal Based …, 2018
42018
Concealing fingerprint-biometric data into audio signals for identify authentication
SM Abdullahi, H Wang, Q Qian, W Cao
Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017
42017
Speech authentication and recovery scheme in encrypted domain
Q Qian, H Wang, SM Abdullahi, H Wang, C Shi
International Workshop on Digital Watermarking, 46-60, 2016
42016
Cybersecurity in Distributed Industrial Digital Twins: Threats, Defenses, and Key Takeaways
SM Abdullahi, A Zare, S Lazarova-Molnar
DiDit 2024, paper 2, 2024
22024
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20