JL-DCF: Joint learning and densely-cooperative fusion framework for RGB-D salient object detection

K Fu, DP Fan, GP Ji, Q Zhao - Proceedings of the IEEE/CVF …, 2020 - openaccess.thecvf.com
This paper proposes a novel joint learning and densely-cooperative fusion (JL-DCF)
architecture for RGB-D salient object detection. Existing models usually treat RGB and depth …

Siamese network for RGB-D salient object detection and beyond

K Fu, DP Fan, GP Ji, Q Zhao, J Shen… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Existing RGB-D salient object detection (SOD) models usually treat RGB and depth as
independent information and design separate networks for feature extraction from each …

[PDF][PDF] Creating a stable and fixed features array for digital color image

ASN Asad, I Shayeb, Q Jaber, B Ayyoub, Z Alqadi… - 2019 - researchgate.net
Color image features extraction is an important and vital process, which is used in many
computer applications such as human fingerprint identification, therefore, shortening the …

A novel based on image blocking method to encrypt-decrypt color

J Al-Azzeh, B Zahran, Z Alqadi, B Ayyoub… - … : International Journal on …, 2019 - joiv.org
Encryption of digital color image is the process of conversion original digital color image into
an encrypted one to protect the image from hacking or to prevent an authorized person to …

[PDF][PDF] Highly Secure Method for Secret Data Transmission

M Barakat, Z Alqadi - International Journal of Scientific …, 2022 - researchgate.net
In this research, we present a new method for protecting confidential and private data, which
combines the two processes of data cryptography and data steganography. The data …

[PDF][PDF] Enhancing the Capacity of LSB Method by Introducing LSB2Z Method

Z Alqadi, B Zahran, Q Jaber, B Ayyoub… - International Journal of …, 2019 - researchgate.net
The purpose of steganography is to conceal the existence of the secret message in the
holding image, thus making a message unreadable by a third party. Steganography is an …

[PDF][PDF] Analysis of procedures used to build an optimal fingerprint recognition system

A Hindi, MO Dwairi, Z Alqadi - International Journal of Computer …, 2020 - academia.edu
Fingerprint recognition is one of the most widely use operation, due the big number of
applications requiring this operation, so seeking a good method of fingerprint features …

[PDF][PDF] Analysis of digital voice features extraction methods

JNI Shayeb, Z Alqadi, J Nader - International Journal of …, 2019 - researchgate.net
K means method and LBP based methods are commonly used for manipulating digital wave
files, and they can be used for wave file features extraction, these features can be used later …

[PDF][PDF] Modified Inverse LSB Method for Highly Secure Message Hiding

M Abuzalata, Z Alqadi, J Al-Azzeh… - International Journal of …, 2019 - academia.edu
The data may be very important and very confidential and when sent in an insecure
environment may be stolen or being snatched on them, which eliminates the importance and …

AMD‐CNN: Android malware detection via feature graph and convolutional neural networks

RS Arslan, M Tasyurek - Concurrency and Computation …, 2022 - Wiley Online Library
Android malware has become a serious threat to mobile device users, and effective
detection and defence architectures are needed to solve this problem. Recently, machine …