Follow
Rafi Ullah
Rafi Ullah
CIS Department- UTP Malaysia
Verified email at utp.edu.my - Homepage
Title
Cited by
Cited by
Year
Authentication and recovery of images using multiple watermarks
R Chamlawi, A Khan, I Usman
Computers & Electrical Engineering 36 (3), 578-584, 2010
1132010
Digital image authentication and recovery: employing integer transform based information embedding and extraction
R Chamlawi, A Khan
Information Sciences 180 (24), 4909-4928, 2010
752010
Wavelet based image authentication and recovery
R Chamlawi, A Khan, A Idris
Journal of Computer Science and Technology 22 (6), 795-804, 2007
492007
Intelligent reversible watermarking and authentication: hiding depth map information for 3D cameras
A Khan, SA Malik, A Ali, R Chamlawi, M Hussain, MT Mahmood, I Usman
Information Sciences 216, 155-175, 2012
472012
Dual-purpose semi-fragile watermark: authentication and recovery of digital images
R Ullah, A Khan, AS Malik
Computers & Electrical Engineering 39 (7), 2019-2030, 2013
242013
A secure semi-fragile watermarking scheme for authentication and recovery of images based on wavelet transform
R Chamlawi, A Khan, A Idris, Z Munir
International Journal of Computer and Information Engineering 2 (11), 3866-3870, 2008
172008
Dual watermarking method for secure image authentication and recovery
R Chamlawi, I Usman, A Khan
2009 IEEE 13th International Multitopic Conference, 1-4, 2009
142009
Image authenticity and perceptual optimization via genetic algorithm and a dependence neighborhood
I Usman, A Khan, R Chamlawi, A Majid
International Journal of Computer and Information Engineering 1 (2), 322-327, 2007
112007
Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches
SA Malik, A Khan, M Hussain, K Jawad, R Chamlawi, A Jalil
Journal of Systems and Software 85 (11), 2665-2673, 2012
92012
Optimal Compression of Medical Images
RU Habib
International Journal of Advanced Computer Science and Applications 10 (4 …, 2019
62019
Tracking of EEG activity using motion estimation to understand brain wiring
H Nisar, AS Malik, R Ullah, SO Shim, A Bawakid, MB Khan, AR Subhani
Signal and Image Analysis for Biomedical and Life Sciences, 159-174, 2015
52015
An orange sorting technique based on size and external defects
N Sattar, S Ziauddin, S Kalsoom, AR Shahid, R Ullah, AH Dar
Proceedings of the International Conference on Image Processing, Computer …, 2014
52014
CB-HVTNet: A channel-boosted hybrid vision transformer network for lymphocyte assessment in histopathological images
ML Ali, Z Rauf, A Khan, A Sohail, R Ullah, J Gwak
arXiv preprint arXiv:2305.09211, 2023
42023
Toward Authentication of Videos: Integer Transform Based Motion Vector Watermarking
R Ullah, SD Khan, M Ullah, F Al-Machot, H Ullah
IEEE Access 10, 75063-75073, 2022
42022
An efficient deep learning framework for face mask detection in complex scenes
SD Khan, R Ullah, MA Rahim, M Rashid, Z Ali, M Ullah, H Ullah
IFIP International Conference on Artificial Intelligence Applications and …, 2022
42022
Authentication and recovery of digital images: potential application in video surveillance and remote sensing
R Chamlawi, CT Li, I Usman, A Khan
2009 Digest of Technical Papers International Conference on Consumer …, 2009
42009
A Novel Spatio–Temporal Deep Learning Vehicle Turns Detection Scheme Using GPS-Only Data
MA Rahim, SD Khan, S Khan, M Rashid, R Ullah, H Tariq, S Czapp
IEEE Access 11, 8727-8733, 2023
32023
Protection of Ultrasound Image Sequence: Employing Motion Vector Reversible Watermarking
RUHF Al-Fayez
International Journal of Advanced Computer Science and Applications 10 (4 …, 2019
32019
Intelligent Watermarking Scheme for image Authentication and Recovery
R Ullah, H Alquhayz
International Journal of Advanced Computer Science and Applications 8 (5 …, 2017
32017
Employing intelligence in the embedding and decoding stages of a robust watermarking system
I Usman, A Khan, R Chamlawi
AEU-International Journal of Electronics and Communications 65 (6), 582-588, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20