Ali Al-Haj

Orcid: 0000-0002-4215-2286

Affiliations:
  • Princess Sumaya University for Technology, King Abdullah II Faculty of Engineering, Amman, Jordan


According to our database1, Ali Al-Haj authored at least 29 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A QoS-aware resource management scheme over fog computing infrastructures in IoT systems.
Multim. Tools Appl., July, 2023

An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol.
J. Supercomput., April, 2023

High-Performance Hardware Implementation of the KATAN Lightweight Cryptographic Cipher.
J. Circuits Syst. Comput., January, 2023

2022
An efficient mutual authentication scheme for IoT systems.
J. Supercomput., 2022

Reversible data hiding using bit flipping and histogram shifting.
Multim. Tools Appl., 2022

A robust and imperceptible watermarking method for 3D DIBR images.
Multim. Tools Appl., 2022

2021
Introduction to the Special Section on Security and Privacy of Medical Data for Smart Healthcare.
ACM Trans. Internet Techn., 2021

An efficient watermarking algorithm for medical images.
Multim. Tools Appl., 2021

Reversible data hiding in adjacent zeros.
Multim. Syst., 2021

2019
An improved capacity data hiding technique based on image interpolation.
Multim. Tools Appl., 2019

Forensics Analysis of Xbox One Game Console.
CoRR, 2019

2017
Crypto-Watermarking of Transmitted Medical Images.
J. Digit. Imaging, 2017

2016
Low complexity semi-fragile watermarking scheme for H.264/AVC authentication.
Multim. Tools Appl., 2016

2015
Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images.
J. Digit. Imaging, 2015

Crypto-based algorithms for secured medical image transmission.
IET Inf. Secur., 2015

A watermarking scheme for DIBR images.
Proceedings of the 2015 International Conference on 3D Imaging, 2015

2014
A dual transform audio watermarking algorithm.
Multim. Tools Appl., 2014

Secured Telemedicine Using Region-Based Watermarking with Tamper Localization.
J. Digit. Imaging, 2014

An imperceptible and robust audio watermarking algorithm.
EURASIP J. Audio Speech Music. Process., 2014

2011
DWT-based audio watermarking.
Int. Arab J. Inf. Technol., 2011

2010
Copyright Protection of Relational Database Systems.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Hybrid DWT-SVD audio watermarking.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

2009
SVD-Based Image Water marking.
J. Digit. Inf. Manag., 2009

2008
An improved SVD-based watermarking scheme for protecting rightful ownership.
Signal Process., 2008

2007
FPGA-Based Implementations of Quadrature Mirror Filter Banks.
Int. J. Comput. Their Appl., 2007

FPGA-Based Quadrature Mirror Filters for DSP Applications.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Non-invertible copyright protection of digital images using DWT and SVD.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

2005
An FPGA-Based Parallel Distributed Arithmetic Implementation of the 1-D Discrete Wavelet Transform.
Informatica (Slovenia), 2005

A Parallel FPGA-Based Implementation of the Discrete Wavelet Transform.
Aust. J. Intell. Inf. Process. Syst., 2005


  Loading...