Sabah Jassim

According to our database1, Sabah Jassim authored at least 47 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Singular value decomposition based matrix surgery.
CoRR, 2023

2022
Artificial Image Tampering Distorts Spatial Distribution of Texture Landmarks and Quality Characteristics.
CoRR, 2022

2020
Efficient High Capacity Steganography Technique.
CoRR, 2020

Steganography Based on Pixel Intensity Value Decomposition.
CoRR, 2020

2019
Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images.
Multim. Tools Appl., 2019

2018
Controlling Sensitivity of Gaussian Bayes Predictions based on Eigenvalue Thresholding.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2018

Inpainting large missing regions based on Seam Carving.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2018

Automatic Detection of Image Morphing by Topology-based Analysis.
Proceedings of the 26th European Signal Processing Conference, 2018

TPICDS: A Two-Phase Parallel Approach for Incremental Clustering of Data Streams.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

SLDPC: Towards Second Order Learning for Detecting Persistent Clusters in Data Streams.
Proceedings of the 2018 10th Computer Science and Electronic Engineering Conference, 2018

2017
Multi-level Trainable Segmentation for Measuring Gestational and Yolk Sacs from Ultrasound Images.
Proceedings of the Medical Image Understanding and Analysis - 21st Annual Conference, 2017

Automatic Quantification of Epidermis Curvature in H&E Stained Microscopic Skin Image of Mice.
Proceedings of the Medical Image Understanding and Analysis - 21st Annual Conference, 2017

Topological Data Analysis for Image Tampering Detection.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

EINCKM: An Enhanced Prototype-based Method for Clustering Evolving Data Streams in Big Data.
Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, 2017

EDDS: An Enhanced Density-Based Method for Clustering Data Streams.
Proceedings of the 46th International Conference on Parallel Processing Workshops, 2017

An Integrative Omics Approach to Identify Sub-Network Biomarker in Type 2 Diabetes Mellitus.
Proceedings of the 2017 European Modelling Symposium (EMS), 2017

Off line writer identification for Arabic language: Analysis and classification techniques using subwords features.
Proceedings of the 1st International Workshop on Arabic Script Analysis and Recognition, 2017

2014
A MATLAB tool for pathway enrichment using a topology-based pathway regulation score.
BMC Bioinform., 2014

Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Feature selection gait-based gender classification under different circumstances.
Proceedings of the Real-Time Image and Video Processing 2014, 2014

Simultaneous edge sensing compression and encryption for real-time video transmission.
Proceedings of the Real-Time Image and Video Processing 2014, 2014

Automatic Identification of Early Miscarriage Based on Multiple Features Extracted From Ultrasound Images.
Proceedings of the Medical Image Understanding and Analysis, 2014

Automated Analysis of Collagen Histology in Ageing Skin.
Proceedings of the BIOIMAGING 2014, 2014

Rational Identification of Prognostic Markers of Breast Cancer.
Proceedings of the BIOINFORMATICS 2014, 2014

2013
A novel method to assess collagen architecture in skin.
BMC Bioinform., 2013

LBP based on multi wavelet sub-bands feature extraction used for face recognition.
Proceedings of the IEEE International Workshop on Machine Learning for Signal Processing, 2013

Secure Steganography Technique Based on Bitplane Indexes.
Proceedings of the 2013 IEEE International Symposium on Multimedia, 2013

Simultaneous video compression and encryption for real-time secure transmission.
Proceedings of the 8th International Symposium on Image and Signal Processing and Analysis, 2013

Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Construction of dictionaries to reconstruct high-resolution images for face recognition.
Proceedings of the International Conference on Biometrics, 2013

Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries.
Proceedings of the Communications and Multimedia Security, 2013

2012
Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion.
Trans. Data Hiding Multim. Secur., 2012

A Topology-Based Score for Pathway Enrichment.
J. Comput. Biol., 2012

Security evaluation of biometric keys.
Comput. Secur., 2012

Robust Biometric Based Key Agreement and Remote Mutual Authentication.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Enhancing face recognition at a distance using super resolution.
Proceedings of the Multimedia and Security Workshop, 2012

Integrating Pathway Enrichment and Gene Network Analysis Provides Accurate Disease Classification.
Proceedings of the BIOINFORMATICS 2012 - Proceedings of the International Conference on Bioinformatics Models, Methods and Algorithms, Vilamoura, Algarve, Portugal, 1, 2012

2011
Guest Editorial Introduction to the Special Issue on Pattern Recognition Technologies for Anti-Terrorism Applications.
IEEE Trans. Syst. Man Cybern. Part C, 2011

2010
Image-Quality-Based Adaptive Face Recognition.
IEEE Trans. Instrum. Meas., 2010

Multi-factor biometrics for authentication: a false sense of security.
Proceedings of the Multimedia and Security Workshop, 2010

On security of multi-factor biometric authentication.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2007
Global features for rapid identity verification with dynamic biometric data.
Proceedings of the INTERSPEECH 2007, 2007

2006
The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly.
Proceedings of the SECRYPT 2006, 2006

2005
Face Recognition in the Presence of Expression and/or Illumination Variation.
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005

2004
Filters Ranking for DWT-Domain Robust Digital Watermarking.
EURASIP J. Adv. Signal Process., 2004

2003
Intellectual Property Protection for Collaborative E-Learning Systems.
Proceedings of the International Conference on Internet Computing, 2003

A Non-Uniform Wavelet-Based Video/Image Compression Technique.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2003


  Loading...