Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel face recognition approach based on steerable pyramid feature extraction., , , , and . ICIP, page 4165-4168. IEEE, (2009)Android data storage security: A review., and . J. King Saud Univ. Comput. Inf. Sci., 32 (5): 543-552 (2020)From Mobile to Wearable System: A Wearable RFID System to Enhance Teaching and Learning Conditions., , , , and . Mob. Inf. Syst., (2016)Local appearance based face recognition method using block based steerable pyramid transform., , , , and . Signal Process., 91 (1): 38-50 (2011)Watermarking for protected fingerprint authentication., , , , , , and . IIT, page 1-5. IEEE Computer Society, (2016)DTCWT-DCT watermarking method for multimodal biometric authentication., , , and . NISS, page 75:1-75:7. ACM, (2019)Zero-steganography using DCT and spatial domain., , , and . AICCSA, page 1-7. IEEE Computer Society, (2013)Arabic Natural Language Processing and Machine Learning-Based Systems., , , , and . IEEE Access, (2019)Unraveling robustness of deep face anti-spoofing models against pixel attacks., , , , and . Multim. Tools Appl., 80 (5): 7229-7246 (2021)Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues., , , , and . IEEE Access, (2018)