


default search action
Sabah Jassim
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Jehan Ghafuri
, Sabah Jassim:
Singular-Value-Decomposition-Based Matrix Surgery. Entropy 26(8): 701 (2024) - 2023
- [i7]Jehan Ghafuri, Sabah Jassim:
Singular value decomposition based matrix surgery. CoRR abs/2302.11446 (2023) - 2022
- [i6]Tahir Hassan, Aras Asaad, Dashti Ali
, Sabah Jassim:
Artificial Image Tampering Distorts Spatial Distribution of Texture Landmarks and Quality Characteristics. CoRR abs/2208.02710 (2022) - 2020
- [i5]Alan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim:
Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. CoRR abs/2004.11974 (2020) - [i4]Alan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim:
Steganography Based on Pixel Intensity Value Decomposition. CoRR abs/2004.11977 (2020) - [i3]Alan Anwer Abdulla, Sabah A. Jassim, Harin Sellahewa:
Efficient High Capacity Steganography Technique. CoRR abs/2004.11984 (2020) - [i2]Alan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim:
Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping. CoRR abs/2004.12467 (2020) - [i1]Alan Anwer Abdulla, Sabah A. Jassim, Harin Sellahewa:
Secure Steganography Technique Based on Bitplane Indexes. CoRR abs/2004.12470 (2020)
2010 – 2019
- 2019
- [j11]Alan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim:
Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multim. Tools Appl. 78(13): 17799-17823 (2019) - 2018
- [j10]Dongxu Han, Hongbo Du, Sabah Jassim:
Controlling Sensitivity of Gaussian Bayes Predictions based on Eigenvalue Thresholding. EAI Endorsed Trans. Ind. Networks Intell. Syst. 5(16): e1 (2018) - [j9]Ahmed K. Al-Jaberi, Sabah A. Jassim, Naseer Al-Jawad
:
Inpainting large missing regions based on Seam Carving. EAI Endorsed Trans. Ind. Networks Intell. Syst. 5(16): e4 (2018) - [c32]Ammar Al Abd Alazeez, Sabah Jassim, Hongbo Du:
SLDPC: Towards Second Order Learning for Detecting Persistent Clusters in Data Streams. CEEC 2018: 248-253 - [c31]Ammar Al Abd Alazeez, Sabah Jassim, Hongbo Du:
TPICDS: A Two-Phase Parallel Approach for Incremental Clustering of Data Streams. Euro-Par Workshops 2018: 5-16 - [c30]Sabah Jassim, Aras Asaad:
Automatic Detection of Image Morphing by Topology-based Analysis. EUSIPCO 2018: 1007-1011 - 2017
- [c29]Makki Maliki, Naseer Al-Jawad
, Sabah Jassim:
Off line writer identification for Arabic language: Analysis and classification techniques using subwords features. ASAR 2017: 145-152 - [c28]Ansam Al-Sabti, Mohamed Zaibi, Sabah Jassim:
An Integrative Omics Approach to Identify Sub-Network Biomarker in Type 2 Diabetes Mellitus. EMS 2017: 53-58 - [c27]Ammar Al Abd Alazeez, Sabah Jassim, Hongbo Du:
EDDS: An Enhanced Density-Based Method for Clustering Data Streams. ICPP Workshops 2017: 103-112 - [c26]Ammar Al Abd Alazeez, Sabah Jassim, Hongbo Du:
EINCKM: An Enhanced Prototype-based Method for Clustering Evolving Data Streams in Big Data. ICPRAM 2017: 173-183 - [c25]Aras Asaad, Sabah Jassim:
Topological Data Analysis for Image Tampering Detection. IWDW 2017: 136-146 - [c24]Dheyaa Ahmed Ibrahim, Hisham Al-Assam, Sabah Jassim, Hongbo Du:
Multi-level Trainable Segmentation for Measuring Gestational and Yolk Sacs from Ultrasound Images. MIUA 2017: 86-97 - [c23]Saif Hussein, Sabah Jassim, Hisham Al-Assam:
Automatic Quantification of Epidermis Curvature in H&E Stained Microscopic Skin Image of Mice. MIUA 2017: 935-945 - 2014
- [j8]Maysson Al-Haj Ibrahim, Sabah Jassim, Michael Anthony Cawthorne, Kenneth Langlands
:
A MATLAB tool for pathway enrichment using a topology-based pathway regulation score. BMC Bioinform. 15: 358 (2014) - [c22]Osman S. Osman, Joanne L. Selway, Parvathy E. Harikumar, Sabah Jassim, Kenneth Langlands
:
Automated Analysis of Collagen Histology in Ageing Skin. BIOIMAGING 2014: 41-48 - [c21]Maysson Al-Haj Ibrahim, Joanne L. Selway, Kian Chin, Sabah Jassim, Michael Anthony Cawthorne, Kenneth Langlands
:
Rational Identification of Prognostic Markers of Breast Cancer. BIOINFORMATICS 2014: 265-270 - [c20]Shan Khazendar, Jessica Farren, Hisham Al-Assam, Hongbo Du, Ahmed Sayasneh, Tom Bourne, Sabah Jassim:
Automatic Identification of Early Miscarriage Based on Multiple Features Extracted From Ultrasound Images. MIUA 2014: 131-136 - [c19]Nazar Al-Hayani, Naseer Al-Jawad
, Sabah Jassim:
Simultaneous edge sensing compression and encryption for real-time video transmission. Real-Time Image and Video Processing 2014: 91390F - [c18]Azhin Tahir Sabir, Naseer Al-Jawad
, Sabah Jassim:
Feature selection gait-based gender classification under different circumstances. Real-Time Image and Video Processing 2014: 91390A - [c17]Alan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim:
Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping. SSR 2014: 151-166 - 2013
- [j7]Osman S. Osman, Joanne L. Selway, Parvathy E. Harikumar, Claire J. Stocker
, Edward T. Wargent
, Michael Anthony Cawthorne, Sabah A. Jassim, Kenneth Langlands
:
A novel method to assess collagen architecture in skin. BMC Bioinform. 14: 260 (2013) - [c16]Sabah A. Jassim:
Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries. Communications and Multimedia Security 2013: 217-232 - [c15]Nadia Al-Hassan, Sabah A. Jassim, Harin Sellahewa:
Construction of dictionaries to reconstruct high-resolution images for face recognition. ICB 2013: 1-8 - [c14]Hisham Al-Assam, Rasber Dh. Rashid
, Sabah Jassim:
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. ICITST 2013: 369-374 - [c13]Nazar Al-Hayani, Naseer Al-Jawad
, Sabah Jassim:
Simultaneous video compression and encryption for real-time secure transmission. ISPA 2013: 240-245 - [c12]Alan Anwer Abdulla, Sabah A. Jassim, Harin Sellahewa:
Secure Steganography Technique Based on Bitplane Indexes. ISM 2013: 287-291 - [c11]Rasber Dh. Rashid
, Sabah A. Jassim, Harin Sellahewa:
LBP based on multi wavelet sub-bands feature extraction used for face recognition. MLSP 2013: 1-6 - 2012
- [j6]Hisham Al-Assam, Sabah Jassim:
Security evaluation of biometric keys. Comput. Secur. 31(2): 151-163 (2012) - [j5]Maysson Al-Haj Ibrahim, Sabah A. Jassim, Michael Anthony Cawthorne, Kenneth Langlands
:
A Topology-Based Score for Pathway Enrichment. J. Comput. Biol. 19(5): 563-573 (2012) - [j4]Hisham Al-Assam, Ali J. Abboud
, Harin Sellahewa, Sabah Jassim:
Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion. Trans. Data Hiding Multim. Secur. 8: 1-18 (2012) - [c10]Maysson Al-Haj Ibrahim, Sabah A. Jassim, Michael Anthony Cawthorne, Kenneth Langlands:
Integrating Pathway Enrichment and Gene Network Analysis Provides Accurate Disease Classification. BIOINFORMATICS 2012: 156-163 - [c9]Nadia Al-Hassan, Sabah A. Jassim, Harin Sellahewa:
Enhancing face recognition at a distance using super resolution. MM&Sec 2012: 123-132 - [c8]Hisham Al-Assam, Sabah Jassim:
Robust Biometric Based Key Agreement and Remote Mutual Authentication. TrustCom 2012: 59-65 - 2011
- [j3]Sos S. Agaian, Jinshan Tang
, Sabah Jassim, C. L. Philip Chen
, Changshui Zhang, Yongyan Cao:
Guest Editorial Introduction to the Special Issue on Pattern Recognition Technologies for Anti-Terrorism Applications. IEEE Trans. Syst. Man Cybern. Part C 41(5): 561-564 (2011) - 2010
- [j2]Harin Sellahewa, Sabah Jassim:
Image-Quality-Based Adaptive Face Recognition. IEEE Trans. Instrum. Meas. 59(4): 805-813 (2010) - [c7]Hisham Al-Assam, Harin Sellahewa, Sabah Jassim:
On security of multi-factor biometric authentication. ICITST 2010: 1-6 - [c6]Hisham Al-Assam, Harin Sellahewa, Sabah Jassim:
Multi-factor biometrics for authentication: a false sense of security. MM&Sec 2010: 81-88
2000 – 2009
- 2007
- [c5]Andrew C. Morris, Jacques C. Koreman, B. Ly-Van, Harin Sellahewa, Sabah Jassim, R. Llarena Gómez:
Global features for rapid identity verification with dynamic biometric data. INTERSPEECH 2007: 2033-2036 - 2006
- [c4]R. Ricci, Gérard Chollet, M. V. Crispino, Sabah Jassim, Jacques C. Koreman, Andrew C. Morris, M. Olivar-Dimas, Sonia Garcia-Salicetti, Pedro Soria-Rodriguez:
The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly. SECRYPT 2006: 9-16 - 2005
- [c3]Harin Sellahewa, Sabah Jassim:
Face Recognition in the Presence of Expression and/or Illumination Variation. AutoID 2005: 144-148 - 2004
- [j1]Martin Dietze, Sabah Jassim:
Filters Ranking for DWT-Domain Robust Digital Watermarking. EURASIP J. Adv. Signal Process. 2004(14): 2093-2101 (2004) - 2003
- [c2]Sabah Jassim, Jinming Ma, Chris Adams:
A Non-Uniform Wavelet-Based Video/Image Compression Technique. CISST 2003: 389-398 - [c1]Jinan Fiaidhi, Sabah Mohammed, Martin Dietze, Sabah Jassim:
Intellectual Property Protection for Collaborative E-Learning Systems. International Conference on Internet Computing 2003: 737-746
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint