Authentication and recovery of images using multiple watermarks R Chamlawi, A Khan, I Usman Computers & Electrical Engineering 36 (3), 578-584, 2010 | 113 | 2010 |
Digital image authentication and recovery: employing integer transform based information embedding and extraction R Chamlawi, A Khan Information Sciences 180 (24), 4909-4928, 2010 | 74 | 2010 |
Intelligent reversible watermarking and authentication: hiding depth map information for 3D cameras A Khan, SA Malik, A Ali, R Chamlawi, M Hussain, MT Mahmood, I Usman Information Sciences 216, 155-175, 2012 | 52 | 2012 |
Wavelet based image authentication and recovery R Chamlawi, A Khan, A Idris Journal of Computer Science and Technology 22 (6), 795-804, 2007 | 49 | 2007 |
Dual-purpose semi-fragile watermark: authentication and recovery of digital images R Ullah, A Khan, AS Malik Computers & Electrical Engineering 39 (7), 2019-2030, 2013 | 26 | 2013 |
A secure semi-fragile watermarking scheme for authentication and recovery of images based on wavelet transform R Chamlawi, A Khan, A Idris, Z Munir International Journal of Computer and Information Engineering 2 (11), 3866-3870, 2008 | 16 | 2008 |
Dual watermarking method for secure image authentication and recovery R Chamlawi, I Usman, A Khan 2009 IEEE 13th International Multitopic Conference, 1-4, 2009 | 14 | 2009 |
Image authenticity and perceptual optimization via genetic algorithm and a dependence neighborhood I Usman, A Khan, R Chamlawi, A Majid International Journal of Computer and Information Engineering 1 (2), 322-327, 2007 | 11 | 2007 |
Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches SA Malik, A Khan, M Hussain, K Jawad, R Chamlawi, A Jalil Journal of Systems and Software 85 (11), 2665-2673, 2012 | 9 | 2012 |
Optimal Compression of Medical Images RU Habib International Journal of Advanced Computer Science and Applications 10 (4 …, 2019 | 8 | 2019 |
Fortifying Against Ransomware: Navigating Cybersecurity Risk Management with a Focus on Ransomware Insurance Strategies SM Mujeeb Ur Rehman Shaikh, Rafi Ullah, Rehan Akbar, K. S. Savita International Journal of Academic Research in Business and Social Sciences …, 2024 | 7 | 2024 |
CB-HVTNet: A channel-boosted hybrid vision transformer network for lymphocyte assessment in histopathological images ML Ali, Z Rauf, A Khan, A Sohail, R Ullah, J Gwak arXiv preprint arXiv:2305.09211, 2023 | 6 | 2023 |
An orange sorting technique based on size and external defects N Sattar, S Ziauddin, S Kalsoom, AR Shahid, R Ullah, AH Dar Proceedings of the International Conference on Image Processing, Computer …, 2014 | 6 | 2014 |
Toward Authentication of Videos: Integer Transform Based Motion Vector Watermarking R Ullah, SD Khan, M Ullah, F Al-Machot, H Ullah IEEE Access 10, 75063-75073, 2022 | 5 | 2022 |
Tracking of EEG activity using motion estimation to understand brain wiring H Nisar, AS Malik, R Ullah, SO Shim, A Bawakid, MB Khan, AR Subhani Signal and Image Analysis for Biomedical and Life Sciences, 159-174, 2015 | 5 | 2015 |
Ransomware Classification with Deep Neural Network and Bi-LSTM MF Hassan, R Akbar, KS Savita, R Ullah, S Mandala Journal of Advanced Research in Applied Sciences and Engineering Technology …, 2024 | 4 | 2024 |
Single-trial extraction of event-related potentials (ERPs) and classification of visual stimuli by ensemble use of discrete wavelet transform with Huffman coding and machine … HU Amin, R Ullah, MF Reza, AS Malik Journal of neuroengineering and rehabilitation 20 (1), 70, 2023 | 4 | 2023 |
A Novel Spatio–Temporal Deep Learning Vehicle Turns Detection Scheme Using GPS-Only Data MA Rahim, SD Khan, S Khan, M Rashid, R Ullah, H Tariq, S Czapp IEEE Access 11, 8727-8733, 2023 | 4 | 2023 |
An efficient deep learning framework for face mask detection in complex scenes SD Khan, R Ullah, MA Rahim, M Rashid, Z Ali, M Ullah, H Ullah IFIP International Conference on Artificial Intelligence Applications and …, 2022 | 4 | 2022 |
Intelligent Watermarking Scheme for image Authentication and Recovery R Ullah, H Alquhayz International Journal of Advanced Computer Science and Applications 8 (5 …, 2017 | 4 | 2017 |