Image steganography techniques: an overview N Hamid, A Yahya, RB Ahmad, OM Al-Qershi International Journal of Computer Science and Security (IJCSS) 6 (3), 168-187, 2012 | 264 | 2012 |
Passive detection of copy-move forgery in digital images: State-of-the-art OM Al-Qershi, BE Khoo Forensic science international 231 (1-3), 284-295, 2013 | 244 | 2013 |
Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images OM Al-Qershi, BE Khoo Journal of digital imaging 24, 114-125, 2011 | 170 | 2011 |
High capacity data hiding schemes for medical images based on difference expansion OM Al-Qershi, BE Khoo Journal of Systems and Software 84 (1), 105-112, 2011 | 120 | 2011 |
Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold OM Al-Qershi, BE Khoo Signal Processing 93 (1), 154-162, 2013 | 75 | 2013 |
ROI-based tamper detection and recovery for medical images using reversible watermarking technique OM Al-Qershi, BE Khoo 2010 IEEE international conference on information theory and information …, 2010 | 60 | 2010 |
Authentication and data hiding using a reversible ROI-based watermarking scheme for DICOM images OM Al-Qershi, BE Khoo Proceedings of international conference on medical systems engineering …, 2009 | 48 | 2009 |
Evaluation of copy-move forgery detection: datasets and evaluation metrics OM Al-Qershi, BE Khoo Multimedia Tools and Applications 77, 31807-31833, 2018 | 45 | 2018 |
A Comparison between using SIFT and SURF for characteristic region based image steganography N Hamid, A Yahya, RB Ahmad, OM Al-Qershi International Journal of Computer Science Issues (IJCSI) 9 (3), 110, 2012 | 39 | 2012 |
Characteristic region based image steganography using speeded-up robust features technique N Hamid, A Yahya, RB Ahmad, O Al-Qershi 2012 International Conference on Future Communication Networks, 141-146, 2012 | 36 | 2012 |
Enhanced block-based copy-move forgery detection using k-means clustering OM Al-Qershi, BE Khoo Multidimensional Systems and Signal Processing 30, 1671-1695, 2019 | 32 | 2019 |
ADMANI: Annotated digital mammograms and associated non-image datasets HML Frazer, JSN Tang, MS Elliott, KM Kunicki, B Hill, R Karthik, CF Kwok, ... Radiology: Artificial Intelligence 5 (2), e220072, 2022 | 19 | 2022 |
Copy-move forgery detection using on locality sensitive hashing and k-means clustering OM Al-Qershi, BE Khoo Information Science and Applications (ICISA) 2016, 663-672, 2016 | 17 | 2016 |
Secured and robust information hiding scheme NH Abdul-Mahdi, A Yahya, RB Ahmad, OM Al-Qershi Procedia Engineering 53, 463-471, 2013 | 17 | 2013 |
Reversible watermarking scheme based on two-dimensional difference expansion (2D-DE) OM Al-Qershi, BE Khoo 2010 Second International Conference on Computer Research and Development …, 2010 | 16 | 2010 |
Enhancing visual quality of spatial image steganography using SqueezeNet deep learning network N Hamid, BS Sumait, BI Bakri, O Al-Qershi Multimedia Tools and Applications 80 (28), 36093-36109, 2021 | 14 | 2021 |
Controlling hiding capacity using image characteristics with a 2D-DE data hiding scheme OM Al-Qershi, BE Khoo AEU-International Journal of Electronics and Communications 68 (4), 346-350, 2014 | 12 | 2014 |
Enhanced matching method for copy-move forgery detection by means of Zernike moments OM Al-Qershi, BE Khoo Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014 …, 2015 | 11 | 2015 |
An improved robust and secured image Steganographic scheme N Hamid, A Yahya, RB Ahmad, OM Al-Qershi International Journal of Electronics and Communication Engineering …, 2012 | 10 | 2012 |
Authentication and data hiding using a reversible ROI-based watermarking scheme for DICOM images M Osamah, O Al-Qershi, BE Khoo Int. Journal of Information and Communication Engineering 5 (2), 801-806, 2009 | 10 | 2009 |