TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique BB Haghighi, AH Taherinia, A Harati Journal of Visual Communication and Image Representation 50, 49-64, 2018 | 67 | 2018 |
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA BB Haghighi, AH Taherinia, AH Mohajerzadeh Information Sciences 486, 204-230, 2019 | 64 | 2019 |
High capacity image steganography on sparse message of scanned document image (SMSDI) SH Soleymani, AH Taherinia Multimedia Tools and Applications 76, 20847-20867, 2017 | 25 | 2017 |
An effective semi-fragile watermarking method for image authentication based on lifting wavelet transform and feed-forward neural network B Bolourian Haghighi, AH Taherinia, R Monsefi Cognitive Computation 12, 863-890, 2020 | 23 | 2020 |
A robust image watermarking using two level DCT and wavelet packets denoising AH Taherinia, M Jamzad 2009 International Conference on Availability, Reliability and Security, 150-157, 2009 | 21 | 2009 |
WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II BB Haghighi, AH Taherinia, A Harati, M Rouhani Applied Soft Computing 101, 107029, 2021 | 20 | 2021 |
A probabilistic framework for copy-move forgery detection based on Markov Random Field B Elhaminia, A Harati, A Taherinia Multimedia Tools and Applications 78, 25591-25609, 2019 | 16 | 2019 |
Double expanding robust image watermarking based on Spread Spectrum technique and BCH coding SH Soleymani, AH Taherinia Multimedia Tools and Applications 76, 3485-3503, 2017 | 16 | 2017 |
A Two-Phase Mechanism for Agent's Action Selection in Soccer Simulation. V Salmani, M Naghibzadeh, F Seifi, A Taherinia WEC (2), 217-220, 2005 | 16 | 2005 |
WACA: a new blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation SH Soleymani, AH Taherinia, AH Mohajerzadeh Multimedia Tools and Applications 78, 19163-19179, 2019 | 15 | 2019 |
A robust spread spectrum watermarking method using two levels DCT AH Taherinia, M Jamzad International Journal of Electronic Security and Digital Forensics 2 (3 …, 2009 | 14 | 2009 |
Analysis of robust recursive least squares: Convergence and tracking AN Sadigh, AH Taherinia, HS Yazdi Signal Processing 171, 107482, 2020 | 11 | 2020 |
High capacity image data hiding of scanned text documents using improved quadtree SH Soleymani, AH Taherinia arXiv preprint arXiv:1803.11286, 2018 | 10 | 2018 |
Blind dewatermarking method based on wavelet transform AH Taherinia, M Jamzad Optical Engineering 50 (5), 057006-057006-8, 2011 | 10 | 2011 |
A robust detection and localization technique for copy-move forgery in digital images MMA Alhaidery, AH Taherinia, HI Shahadi Journal of King Saud University-Computer and Information Sciences 35 (1 …, 2023 | 9 | 2023 |
A two‐step watermarking attack using long‐range correlation image restoration AH Taherinia, M Jamzad Security and Communication Networks 5 (6), 625-635, 2012 | 9 | 2012 |
A new watermarking attack based on content-aware image resizing AH Taherinia, M Jamzad 2009 International Multimedia, Signal Processing and Communication …, 2009 | 9 | 2009 |
A new adaptive watermarking attack in wavelet domain AH Taherinia, M Jamzad 2009 International Multimedia, Signal Processing and Communication …, 2009 | 8 | 2009 |
Crowd analysis using bayesian risk kernel density estimation M Razavi, HS Yazdi, AH Taherinia Engineering Applications of Artificial Intelligence 82, 282-293, 2019 | 7 | 2019 |
A passive image forensic scheme based on an adaptive and hybrid techniques MMA Alhaidery, AH Taherinia Multimedia Tools and Applications 81 (9), 12681-12699, 2022 | 6 | 2022 |