DeepFake detection for human face images and videos: A survey A Malik, M Kuribayashi, SM Abdullahi, AN Khan Ieee Access 10, 18757-18775, 2022 | 88 | 2022 |
Fractal coding-based robust and alignment-free fingerprint image hashing SM Abdullahi, H Wang, T Li IEEE Transactions on Information Forensics and Security 15, 2587-2601, 2020 | 65 | 2020 |
Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection J Li, H Wang, P He, SM Abdullahi, B Li Digital Signal Processing 120, 103256, 2022 | 15 | 2022 |
Reversible data hiding with multiple data for multiple users in an encrypted image A Malik, H Wang, H Wu, SM Abdullahi International Journal of Digital Crime and Forensics (IJDCF) 11 (1), 46-61, 2019 | 14 | 2019 |
Light-FireNet: An efficient lightweight network for fire detection in diverse environments O Khudayberdiev, J Zhang, SM Abdullahi, S Zhang Multimedia Tools and Applications 81 (17), 24553-24572, 2022 | 12 | 2022 |
Constructing immunized stego-image for secure steganography via artificial immune system W Li, H Wang, Y Chen, SM Abdullahi, J Luo IEEE Transactions on Multimedia 25, 8320-8333, 2023 | 11 | 2023 |
Robust blind video watermarking against geometric deformations and online video sharing platform processing M He, H Wang, F Zhang, SM Abdullahi, L Yang IEEE Transactions on Dependable and Secure Computing 20 (6), 4702-4718, 2022 | 9 | 2022 |
Dataset mismatched steganalysis using subdomain adaptation with guiding feature L Zhang, SM Abdullahi, P He, H Wang Telecommunication Systems 80 (2), 263-276, 2022 | 9 | 2022 |
High-capacity reversible data hiding in encrypted images using multi-layer embedding A Malik, P He, H Wang, AN Khan, S Pirasteh, SM Abdullahi IEEE Access 8, 148997-149010, 2020 | 9 | 2020 |
Biometric template attacks and recent protection mechanisms: A survey SM Abdullahi, S Sun, B Wang, N Wei, H Wang Information Fusion 103, 102144, 2024 | 7 | 2024 |
Identification of electronic disguised voices in the noisy environment W Cao, H Wang, H Zhao, Q Qian, SM Abdullahi Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017 | 7 | 2017 |
Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals SM Abdullahi, H Wang Multimedia Tools and Applications 77, 20753-20782, 2018 | 6 | 2018 |
Cancelable fingerprint template construction using vector permutation and shift-ordering SM Abdullahi, K Lv, S Sun, H Wang IEEE Transactions on Dependable and Secure Computing 20 (5), 3828-3844, 2022 | 5 | 2022 |
Fingerprint image hashing based on minutiae points and shape context SM Abdullahi, H Wang, A Malik Digital Forensics and Forensic Investigations: Breakthroughs in Research and …, 2020 | 4 | 2020 |
Fourier-Mellin transform and fractal coding for secure and robust fingerprint image hashing SM Abdullahi, H Wang 2018 15th IEEE International Conference on Advanced Video and Signal Based …, 2018 | 4 | 2018 |
Speech authentication and recovery scheme in encrypted domain Q Qian, H Wang, SM Abdullahi, H Wang, C Shi Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017 | 4 | 2017 |
Concealing fingerprint-biometric data into audio signals for identify authentication SM Abdullahi, H Wang, Q Qian, W Cao Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017 | 4 | 2017 |
Spoofed fingerprint image detection using local phase patch segment extraction and a lightweight network SM Abdullahi, S Sun, A Malik, O Khudeyberdiev, R Basheer IFIP International Conference on Digital Forensics, 85-105, 2022 | 2 | 2022 |
The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy SM Abdullahi, S Sun, H Wang, B Wang Pattern Recognition Letters 172, 221-229, 2023 | 1 | 2023 |
A hybrid BTP approach with filtered BCH codes for improved performance and security SM Abdullahi, S Sun, Y Wang, PP Yang, HZ Wang, B Wang Journal of Information Security and Applications 71, 103355, 2022 | 1 | 2022 |