scispace - formally typeset
H

H. I. Saleh

Researcher at Egyptian Atomic Energy Authority

Publications -  41
Citations -  511

H. I. Saleh is an academic researcher from Egyptian Atomic Energy Authority. The author has contributed to research in topics: Digital watermarking & Scintillation. The author has an hindex of 10, co-authored 41 publications receiving 436 citations. Previous affiliations of H. I. Saleh include Forschungszentrum Jülich.

Papers
More filters
Journal ArticleDOI

Pulse shape discrimination of LSO and LuYAP scintillators for depth of interaction detection in PET

TL;DR: In this article, the depth of interaction information in a positron emission tomography scanner using phoswich detectors is identified from the pulse shape of the corresponding scintillator material.
Journal ArticleDOI

An FPGA implementation guide for some different types of serial–parallel multiplier structures

TL;DR: A performance evaluation and comparison for different serial–parallel multiplier structures have been carried out for the case of their implementation by one of the programmable logic devices, such as a field programmable gate array (FPGA).
Journal ArticleDOI

A quality guaranteed robust image watermarking optimization with Artificial Bee Colony

TL;DR: This paper provides an intelligent system for watermarking through incorporating a meta-heuristic technique along with an embedding method to achieve an optimized performance and offers a robust solution that can be applied to numerous multimedia applications such as film industry, intelligent surveillance and security systems.
Journal ArticleDOI

Quality metric-based fitness function for robust watermarking optimisation with Bees algorithm

TL;DR: In this study, the embedding strength parameters for per-block image watermarking in the discrete cosine transform (DCT) domain are optimised and the Bees algorithm is selected as the optimisation method and the proposed fitness function is applied.
Journal ArticleDOI

Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering

TL;DR: The effectiveness of the proposed image authentication approach under some of the most common attacks of image tampering, including copy move, constant average, and vector quantization attacks is examined.