Amirhossein Taherinia

Orcid: 0000-0002-5103-4812

According to our database1, Amirhossein Taherinia authored at least 31 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Image steganography based on smooth cycle-consistent adversarial learning.
J. Inf. Secur. Appl., December, 2023

Fast and accurate image retrieval using knowledge distillation from multiple deep pre-trained networks.
Multim. Tools Appl., September, 2023

A robust detection and localization technique for copy-move forgery in digital images.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

Management of the optimizer's curse concept in single-task diffusion networks.
Inf. Sci., 2023

Deep learning and traditional-based CAD schemes for the pulmonary embolism diagnosis: A survey.
CoRR, 2023

2022
Cloning detection scheme based on linear and curvature scale space with new false positive removal filters.
Multim. Tools Appl., 2022

A passive image forensic scheme based on an adaptive and hybrid techniques.
Multim. Tools Appl., 2022

Non-additive image steganographic framework based on variational inference in Markov Random Fields.
J. Inf. Secur. Appl., 2022

2021
WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II.
Appl. Soft Comput., 2021

2020
Analysis of robust recursive least squares: Convergence and tracking.
Signal Process., 2020

An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network.
Cogn. Comput., 2020

TMTCPT: The Tree Method based on the Taxonomic Categorization and the Phylogenetic Tree for fine-grained categorization.
Biosyst., 2020

Robust Heterogeneous C-means.
Appl. Soft Comput., 2020

2019
WACA: a new blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation.
Multim. Tools Appl., 2019

A probabilistic framework for copy-move forgery detection based on Markov Random Field.
Multim. Tools Appl., 2019

TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA.
Inf. Sci., 2019

Crowd analysis using Bayesian Risk Kernel Density Estimation.
Eng. Appl. Artif. Intell., 2019

2018
TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique.
J. Vis. Commun. Image Represent., 2018

Robust Semi-Supervised Growing Self-Organizing Map.
Expert Syst. Appl., 2018

A blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation.
CoRR, 2018

High Capacity Image Data Hiding of Scanned Text Documents Using Improved Quadtree.
CoRR, 2018

TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA.
CoRR, 2018

TRLF: An Effective Semi-fragile Watermarking Method for Tamper Detection and Recovery based on LWT and FNN.
CoRR, 2018

2017
High capacity image steganography on sparse message of scanned document image (SMSDI).
Multim. Tools Appl., 2017

Double expanding robust image watermarking based on Spread Spectrum technique and BCH coding.
Multim. Tools Appl., 2017

2012
A two-step watermarking attack using long-range correlation image restoration.
Secur. Commun. Networks, 2012

2010
A new spread spectrum watermarking method using two levels DCT.
Int. J. Electron. Secur. Digit. Forensics, 2010

2009
A robust spread spectrum watermarking method using two levels DCT.
Int. J. Electron. Secur. Digit. Forensics, 2009

A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising.
Proceedings of the The Forth International Conference on Availability, 2009

A New Watermarking Attack Using Long-Range Correlation Image Restoration.
Proceedings of the The Forth International Conference on Availability, 2009

2005
A Two-Phase Mechanism for Agent's Action Selection in Soccer Simulation.
Proceedings of the Second World Enformatika Conference, 2005


  Loading...