default search action
Amirhossein Taherinia
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Atieh Gharib, Hadi Sadoghi Yazdi, Amir Hossein Taherinia:
Management of the optimizer's curse concept in single-task diffusion networks. Inf. Sci. 642: 119109 (2023) - [j22]Behnaz Abdollahi, Ahad Harati, Amir Hossein Taherinia:
Image steganography based on smooth cycle-consistent adversarial learning. J. Inf. Secur. Appl. 79: 103631 (2023) - [j21]Manaf Mohammed Ali Alhaidery, Amir Hossein Taherinia, Haider Ismael Shahadi:
A robust detection and localization technique for copy-move forgery in digital images. J. King Saud Univ. Comput. Inf. Sci. 35(1): 449-461 (2023) - [j20]Hasan Salman, Amir Hossein Taherinia, Davood Zabihzadeh:
Fast and accurate image retrieval using knowledge distillation from multiple deep pre-trained networks. Multim. Tools Appl. 82(22): 33937-33959 (2023) - [i6]Seyed Hesamoddin Hosseini, Amir Hossein Taherinia, Mahdi Saadatmand:
Deep learning and traditional-based CAD schemes for the pulmonary embolism diagnosis: A survey. CoRR abs/2312.01351 (2023) - 2022
- [j19]Behnaz Abdollahi, Ahad Harati, Amirhossein Taherinia:
Non-additive image steganographic framework based on variational inference in Markov Random Fields. J. Inf. Secur. Appl. 68: 103254 (2022) - [j18]Manaf Mohammed Ali Alhaidery, Amir Hossein Taherinia, Hadi Sadoghi Yazdi:
Cloning detection scheme based on linear and curvature scale space with new false positive removal filters. Multim. Tools Appl. 81(6): 8745-8766 (2022) - [j17]Manaf Mohammed Ali Alhaidery, Amir Hossein Taherinia:
A passive image forensic scheme based on an adaptive and hybrid techniques. Multim. Tools Appl. 81(9): 12681-12699 (2022) - 2021
- [j16]Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Ahad Harati, Modjtaba Rouhani:
WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II. Appl. Soft Comput. 101: 107029 (2021) - 2020
- [j15]Atieh Gharib, Hadi Sadoghi Yazdi, Amir Hossein Taherinia:
Robust Heterogeneous C-means. Appl. Soft Comput. 86 (2020) - [j14]Fateme Bameri, Hamid-Reza Pourreza, Amir Hossein Taherinia, Mansour Aliabadian, Hamid-Reza Mortezapour, Raziyeh Abdilzadeh:
TMTCPT: The Tree Method based on the Taxonomic Categorization and the Phylogenetic Tree for fine-grained categorization. Biosyst. 195: 104137 (2020) - [j13]Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi:
An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network. Cogn. Comput. 12(4): 863-890 (2020) - [j12]Alireza Naeimi Sadigh, Amir Hossein Taherinia, Hadi Sadoghi Yazdi:
Analysis of robust recursive least squares: Convergence and tracking. Signal Process. 171: 107482 (2020) - [i5]Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Ahad Harati, Modjtaba Rouhani:
WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II. CoRR abs/2005.03382 (2020)
2010 – 2019
- 2019
- [j11]Mahnaz Razavi, Hadi Sadoghi Yazdi, Amir Hossein Taherinia:
Crowd analysis using Bayesian Risk Kernel Density Estimation. Eng. Appl. Artif. Intell. 82: 282-293 (2019) - [j10]Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh:
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA. Inf. Sci. 486: 204-230 (2019) - [j9]Seyyed Hossein Soleymani, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh:
WACA: a new blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation. Multim. Tools Appl. 78(14): 19163-19179 (2019) - [j8]Behnaz Elhaminia, Ahad Harati, Amirhossein Taherinia:
A probabilistic framework for copy-move forgery detection based on Markov Random Field. Multim. Tools Appl. 78(18): 25591-25609 (2019) - 2018
- [j7]Ali Mehrizi, Hadi Sadoghi Yazdi, Amir Hossein Taherinia:
Robust Semi-Supervised Growing Self-Organizing Map. Expert Syst. Appl. 105: 23-33 (2018) - [j6]Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Ahad Harati:
TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J. Vis. Commun. Image Represent. 50: 49-64 (2018) - [i4]Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi:
TRLF: An Effective Semi-fragile Watermarking Method for Tamper Detection and Recovery based on LWT and FNN. CoRR abs/1802.07119 (2018) - [i3]Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh:
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA. CoRR abs/1803.02623 (2018) - [i2]Seyyed Hossein Soleymani, Amir Hossein Taherinia:
High Capacity Image Data Hiding of Scanned Text Documents Using Improved Quadtree. CoRR abs/1803.11286 (2018) - [i1]Seyyed Hossein Soleymani, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh:
A blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation. CoRR abs/1804.11240 (2018) - 2017
- [j5]Seyyed Hossein Soleymani, Amirhossein Taherinia:
Double expanding robust image watermarking based on Spread Spectrum technique and BCH coding. Multim. Tools Appl. 76(3): 3485-3503 (2017) - [j4]Seyyed Hossein Soleymani, Amirhossein Taherinia:
High capacity image steganography on sparse message of scanned document image (SMSDI). Multim. Tools Appl. 76(20): 20847-20867 (2017) - 2012
- [j3]Amirhossein Taherinia, Mansour Jamzad:
A two-step watermarking attack using long-range correlation image restoration. Secur. Commun. Networks 5(6): 625-635 (2012) - 2010
- [j2]Amirhossein Taherinia, Mansour Jamzad:
A new spread spectrum watermarking method using two levels DCT. Int. J. Electron. Secur. Digit. Forensics 3(1): 1-26 (2010)
2000 – 2009
- 2009
- [j1]Amirhossein Taherinia, Mansour Jamzad:
A robust spread spectrum watermarking method using two levels DCT. Int. J. Electron. Secur. Digit. Forensics 2(3): 280-305 (2009) - [c3]Amirhossein Taherinia, Mansour Jamzad:
A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising. ARES 2009: 150-157 - [c2]Amirhossein Taherinia, Mehran Fotouhi, Mansour Jamzad:
A New Watermarking Attack Using Long-Range Correlation Image Restoration. ARES 2009: 589-594 - 2005
- [c1]Vahid Salmani, Mahmoud Naghibzadeh, Farid Seifi, Amirhossein Taherinia:
A Two-Phase Mechanism for Agent's Action Selection in Soccer Simulation. WEC (2) 2005: 217-220
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint