default search action
Sani M. Abdullahi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Sani M. Abdullahi, Shuifa Sun, Beng Wang, Ning Wei, Hong-Xia Wang:
Biometric template attacks and recent protection mechanisms: A survey. Inf. Fusion 103: 102144 (2024) - [j15]Jinghong Xia, Hongxia Wang, Sani M. Abdullahi, Heng Wang, Fei Zhang, Bingling Luo:
Enhanced Fourier-Mellin domain watermarking for social networking platforms. J. Inf. Secur. Appl. 86: 103884 (2024) - [c8]Sani M. Abdullahi, Sanja Lazarova-Molnar:
Toward a Unified Security Framework for Digital Twin Architectures. CSR 2024: 612-617 - [c7]Sani M. Abdullahi, Ashkan Zare, Sanja Lazarova-Molnar:
Cybersecurity in Distributed Industrial Digital Twins: Threats, Defenses, and Key Takeaways. DiDit@DisCoTec 2024 - 2023
- [j14]Sani M. Abdullahi, Shuifa Sun, Hongxia Wang, Beng Wang:
The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy. Pattern Recognit. Lett. 172: 221-229 (2023) - [j13]Sani M. Abdullahi, Ke Lv, Shuifa Sun, Hongxia Wang:
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering. IEEE Trans. Dependable Secur. Comput. 20(5): 3828-3844 (2023) - [j12]Mingze He, Hongxia Wang, Fei Zhang, Sani M. Abdullahi, Ling Yang:
Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing. IEEE Trans. Dependable Secur. Comput. 20(6): 4702-4718 (2023) - [j11]Wanjie Li, Hongxia Wang, Yijing Chen, Sani M. Abdullahi, Jie Luo:
Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System. IEEE Trans. Multim. 25: 8320-8333 (2023) - [c6]Jinghong Xia, Hongxia Wang, Sani M. Abdullahi, Heng Wang, Fei Zhang, Bingling Luo:
Adaptive and Robust Fourier-Mellin-Based Image Watermarking for Social Networking Platforms. ICME 2023: 2843-2848 - 2022
- [j10]Asad Malik, Minoru Kuribayashi, Sani M. Abdullahi, Ahmad Neyaz Khan:
DeepFake Detection for Human Face Images and Videos: A Survey. IEEE Access 10: 18757-18775 (2022) - [j9]Jialong Li, Hongxia Wang, Peisong He, Sani M. Abdullahi, Bin Li:
Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection. Digit. Signal Process. 120: 103256 (2022) - [j8]Sani M. Abdullahi, Shuifa Sun, Yifei Wang, Pengpeng Yang, HuaZheng Wang, Beng Wang:
A hybrid BTP approach with filtered BCH codes for improved performance and security. J. Inf. Secur. Appl. 71: 103355 (2022) - [j7]Otabek Khudayberdiev, Jiashu Zhang, Sani M. Abdullahi, Sheng Zhang:
Light-FireNet: an efficient lightweight network for fire detection in diverse environments. Multim. Tools Appl. 81(17): 24553-24572 (2022) - [j6]Lei Zhang, Sani M. Abdullahi, Peisong He, Hongxia Wang:
Dataset mismatched steganalysis using subdomain adaptation with guiding feature. Telecommun. Syst. 80(2): 263-276 (2022) - [c5]Sani Mohammed Abdullahi, Shuifa Sun, Asad Malik, Otabek Khudayberdiev, Riskhan Basheer:
Spoofed Fingerprint Image Detection Using Local Phase Patch Segment Extraction and a Lightweight Network. IFIP Int. Conf. Digital Forensics 2022: 85-105 - 2021
- [i1]Sani M. Abdullahi, Shuifa Sun:
Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process. CoRR abs/2105.10227 (2021) - 2020
- [j5]Asad Malik, Peisong He, Hongxia Wang, Ahmad Neyaz Khan, Saied Pirasteh, Sani M. Abdullahi:
High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding. IEEE Access 8: 148997-149010 (2020) - [j4]Sani M. Abdullahi, Hongxia Wang, Tao Li:
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing. IEEE Trans. Inf. Forensics Secur. 15: 2587-2601 (2020)
2010 – 2019
- 2019
- [j3]Asad Malik, Hongxia Wang, Hanzhou Wu, Sani M. Abdullahi:
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image. Int. J. Digit. Crime Forensics 11(1): 46-61 (2019) - 2018
- [j2]Sani M. Abdullahi, Hongxia Wang, Asad Malik:
Fingerprint Image Hashing Based on Minutiae Points and Shape Context. Int. J. Digit. Crime Forensics 10(4): 1-20 (2018) - [j1]Sani M. Abdullahi, Hongxia Wang:
Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals. Multim. Tools Appl. 77(16): 20753-20782 (2018) - [c4]Sani M. Abdullahi, Hongxia Wang:
Fourier-Mellin Transform and Fractal Coding for Secure and Robust Fingerprint Image Hashing. AVSS 2018: 1-7 - 2016
- [c3]Qing Qian, Hongxia Wang, Sani M. Abdullahi, Huan Wang, Canghong Shi:
Speech Authentication and Recovery Scheme in Encrypted Domain. IWDW 2016: 46-60 - [c2]Wencheng Cao, Hongxia Wang, Hong Zhao, Qing Qian, Sani M. Abdullahi:
Identification of Electronic Disguised Voices in the Noisy Environment. IWDW 2016: 75-87 - [c1]Sani M. Abdullahi, Hongxia Wang, Qing Qian, Wencheng Cao:
Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication. IWDW 2016: 129-144
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint