关注
Somayeh Sadeghi
标题
引用次数
引用次数
年份
An effective SVD-based image tampering detection and self-recovery using active watermarking
S Dadkhah, A Abd Manaf, Y Hori, AE Hassanien, S Sadeghi
Signal Processing: Image Communication 29 (10), 1197-1210, 2014
1512014
Anti-spoofing method for fingerprint recognition using patch based deep learning machine
DM Uliyan, S Sadeghi, HA Jalab
Engineering Science and Technology, an International Journal 23 (2), 264-273, 2020
942020
State of the art in passive digital image forgery detection: copy-move image forgery
S Sadeghi, S Dadkhah, HA Jalab, G Mazzola, D Uliyan
Pattern Analysis and Applications 21, 291-306, 2018
682018
A novel forged blurred region detection system for image forensic applications
DM Uliyan, HA Jalab, AWA Wahab, P Shivakumara, S Sadeghi
Expert Systems with Applications 64, 1-10, 2016
512016
Image region duplication forgery detection based on angular radial partitioning and Harris key-points
DM Uliyan, HA Jalab, AW Abdul Wahab, S Sadeghi
Symmetry 8 (7), 62, 2016
452016
Efficient copy-move forgery detection for digital images
S Sadeghi, HA Jalab, S Dadkhah
International Journal of Computer and Information Engineering 6 (11), 1339-1342, 2012
282012
Keypoint based authentication and localization of copy-move forgery in digital image
S Sadeghi, HA Jalab, KS Wong, D Uliyan, S Dadkhah
Malaysian Journal of Computer Science 30 (2), 117-133, 2017
232017
Efficient digital image authentication and tamper localization technique using 3lsb watermarking
S Dadkhah, A Abd Manaf, S Sadeghi
International Journal of Computer Science Issues (IJCSI) 9 (1), 1, 2012
182012
Federated reinforcement learning in IoT: applications, opportunities and open challenges
EC Pinto Neto, S Sadeghi, X Zhang, S Dadkhah
Applied Sciences 13 (11), 6497, 2023
122023
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics.
S Dadkhah, M Köppen, HA Jalab, S Sadeghi, AA Manaf, DM Uliyan
ICPRAM, 612-619, 2017
112017
Bad Ai: Investigating the effect of half-toning techniques on unwanted face detection systems
S Dadkhah, M Koeppen, S Sadeghi, K Yoshida
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
102018
An efficient image self-recovery and tamper detection using fragile watermarking
S Dadkhah, AA Manaf, S Sadeghi
International Conference Image Analysis and Recognition, 504-513, 2014
102014
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective
ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux, AA Ghorbani
Computer Communications, 2023
72023
Efficient image authentication and tamper localization algorithm using active watermarking
S Dadkhah, AA Manaf, S Sadeghi
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 115-148, 2014
72014
Efficient two level image tamper detection using three lsb watermarking
S Dadkhah, A Abd Manaf, S Sadeghi
2012 Fourth International Conference on Computational Intelligence and …, 2012
72012
An efficient ward-based copy-move forgery detection method for digital image forensic
S Dadkhah, M Koppen, S Sadeghi, K Yoshida, HA Jalab, AA Manaf
2017 International Conference on Image and Vision Computing New Zealand …, 2017
62017
CICIoMT2024: Attack Vectors in Healthcare devices-A Multi-Protocol Dataset for Assessing IoMT Device Security
S Dadkhah, E Carlos Pinto Neto, R Ferreira, R Chukwuka Molokwu, ...
Raphael and Chukwuka Molokwu, Reginald and Sadeghi, Somayeh and Ghorbani …, 2024
32024
Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering
HMS Parvez, HA Jalab, R Ala’a, S Sadeghi, DM Uliyan
2018 International Conference on Smart Computing and Electronic Enterprise …, 2018
32018
Mitigating Adversarial Attacks against IoT Profiling
ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux
Electronics 13 (13), 2646, 2024
2024
An Efficient Replay Method to Prevent SURF-Based Face Detection
S Dadkhah, M Köppen, S Sadeghi, K Yoshida
2018 5th Asia-Pacific World Congress on Computer Science and Engineering …, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–20