关注
Sani M. Abdullahi
Sani M. Abdullahi
University of Southern Denmark
在 my.swjtu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
DeepFake detection for human face images and videos: A survey
A Malik, M Kuribayashi, SM Abdullahi, AN Khan
Ieee Access 10, 18757-18775, 2022
882022
Fractal coding-based robust and alignment-free fingerprint image hashing
SM Abdullahi, H Wang, T Li
IEEE Transactions on Information Forensics and Security 15, 2587-2601, 2020
652020
Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection
J Li, H Wang, P He, SM Abdullahi, B Li
Digital Signal Processing 120, 103256, 2022
152022
Reversible data hiding with multiple data for multiple users in an encrypted image
A Malik, H Wang, H Wu, SM Abdullahi
International Journal of Digital Crime and Forensics (IJDCF) 11 (1), 46-61, 2019
142019
Light-FireNet: An efficient lightweight network for fire detection in diverse environments
O Khudayberdiev, J Zhang, SM Abdullahi, S Zhang
Multimedia Tools and Applications 81 (17), 24553-24572, 2022
122022
Constructing immunized stego-image for secure steganography via artificial immune system
W Li, H Wang, Y Chen, SM Abdullahi, J Luo
IEEE Transactions on Multimedia 25, 8320-8333, 2023
112023
Robust blind video watermarking against geometric deformations and online video sharing platform processing
M He, H Wang, F Zhang, SM Abdullahi, L Yang
IEEE Transactions on Dependable and Secure Computing 20 (6), 4702-4718, 2022
92022
Dataset mismatched steganalysis using subdomain adaptation with guiding feature
L Zhang, SM Abdullahi, P He, H Wang
Telecommunication Systems 80 (2), 263-276, 2022
92022
High-capacity reversible data hiding in encrypted images using multi-layer embedding
A Malik, P He, H Wang, AN Khan, S Pirasteh, SM Abdullahi
IEEE Access 8, 148997-149010, 2020
92020
Biometric template attacks and recent protection mechanisms: A survey
SM Abdullahi, S Sun, B Wang, N Wei, H Wang
Information Fusion 103, 102144, 2024
72024
Identification of electronic disguised voices in the noisy environment
W Cao, H Wang, H Zhao, Q Qian, SM Abdullahi
Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017
72017
Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals
SM Abdullahi, H Wang
Multimedia Tools and Applications 77, 20753-20782, 2018
62018
Cancelable fingerprint template construction using vector permutation and shift-ordering
SM Abdullahi, K Lv, S Sun, H Wang
IEEE Transactions on Dependable and Secure Computing 20 (5), 3828-3844, 2022
52022
Fingerprint image hashing based on minutiae points and shape context
SM Abdullahi, H Wang, A Malik
Digital Forensics and Forensic Investigations: Breakthroughs in Research and …, 2020
42020
Fourier-Mellin transform and fractal coding for secure and robust fingerprint image hashing
SM Abdullahi, H Wang
2018 15th IEEE International Conference on Advanced Video and Signal Based …, 2018
42018
Speech authentication and recovery scheme in encrypted domain
Q Qian, H Wang, SM Abdullahi, H Wang, C Shi
Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017
42017
Concealing fingerprint-biometric data into audio signals for identify authentication
SM Abdullahi, H Wang, Q Qian, W Cao
Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017
42017
Spoofed fingerprint image detection using local phase patch segment extraction and a lightweight network
SM Abdullahi, S Sun, A Malik, O Khudeyberdiev, R Basheer
IFIP International Conference on Digital Forensics, 85-105, 2022
22022
The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy
SM Abdullahi, S Sun, H Wang, B Wang
Pattern Recognition Letters 172, 221-229, 2023
12023
A hybrid BTP approach with filtered BCH codes for improved performance and security
SM Abdullahi, S Sun, Y Wang, PP Yang, HZ Wang, B Wang
Journal of Information Security and Applications 71, 103355, 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–20