Sani M. Abdullahi

Orcid: 0000-0003-4962-2794

According to our database1, Sani M. Abdullahi authored at least 32 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances.
Int. J. Inf. Sec., February, 2025

S-Faster R-CNN: Intraspectral Similarity Learning for Audio Copy-Move Forgery Localization in IoT Security.
IEEE Internet Things J., 2025

Recaptured Image Detection Based on Multi-Scale Residual Features of Discriminative Regions.
IEICE Trans. Inf. Syst., 2025

An adaptive and large payload audio watermarking against jittering attacks.
Comput. Electr. Eng., 2025

Quantitative Assessment of Energy Efficiency, Comfort, and Safety in an Intelligent Heating System Under False Data Injection Attacks.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2025 Workshops, 2025

Cybersecurity-oriented Digital Twins: A Double-Edged Sword or a Game Changer?
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2025

Simulation-Based Analysis of OPC UA Set-Up Vulnerability and Its Security Risks in Cyber-Physical Manufacturing Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2025

2024
Biometric template attacks and recent protection mechanisms: A survey.
Inf. Fusion, March, 2024

Enhanced Fourier-Mellin domain watermarking for social networking platforms.
J. Inf. Secur. Appl., 2024

Cybersecurity in Distributed Industrial Digital Twins: Threats, Defenses, and Key Takeaways.
DiDit@DisCoTec, 2024

Toward a Unified Security Framework for Digital Twin Architectures.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy.
Pattern Recognit. Lett., August, 2023

Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System.
IEEE Trans. Multim., 2023

Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing.
IEEE Trans. Dependable Secur. Comput., 2023

Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering.
IEEE Trans. Dependable Secur. Comput., 2023

Adaptive and Robust Fourier-Mellin-Based Image Watermarking for Social Networking Platforms.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
Dataset mismatched steganalysis using subdomain adaptation with guiding feature.
Telecommun. Syst., 2022

Light-FireNet: an efficient lightweight network for fire detection in diverse environments.
Multim. Tools Appl., 2022

A hybrid BTP approach with filtered BCH codes for improved performance and security.
J. Inf. Secur. Appl., 2022

Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection.
Digit. Signal Process., 2022

DeepFake Detection for Human Face Images and Videos: A Survey.
IEEE Access, 2022

Spoofed Fingerprint Image Detection Using Local Phase Patch Segment Extraction and a Lightweight Network.
Proceedings of the Advances in Digital Forensics XVIII, 2022

2021
Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process.
CoRR, 2021

2020
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing.
IEEE Trans. Inf. Forensics Secur., 2020

High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding.
IEEE Access, 2020

2019
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image.
Int. J. Digit. Crime Forensics, 2019

2018
Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals.
Multim. Tools Appl., 2018

Fingerprint Image Hashing Based on Minutiae Points and Shape Context.
Int. J. Digit. Crime Forensics, 2018

Fourier-Mellin Transform and Fractal Coding for Secure and Robust Fingerprint Image Hashing.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018

2016
Speech Authentication and Recovery Scheme in Encrypted Domain.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Identification of Electronic Disguised Voices in the Noisy Environment.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016


  Loading...