


default search action
Ali Al-Haj 0001
Person information
- affiliation: Princess Sumaya University for Technology, King Abdullah II Faculty of Engineering, Amman, Jordan
Other persons with the same name
- Ali Al-Haj 0002
(aka: Ali M. Al-Haj 0002) — University of Portsmouth, UK
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Muntaser Al-Moselly, Ali Al-Haj
:
High-Performance Hardware Implementation of the KATAN Lightweight Cryptographic Cipher. J. Circuits Syst. Comput. 32(1): 2350017:1-2350017:26 (2023) - [j22]Najwa Abu-Amssimir, Ali Al-Haj
:
A QoS-aware resource management scheme over fog computing infrastructures in IoT systems. Multim. Tools Appl. 82(18): 28281-28300 (2023) - [j21]Jumana Haimour, Ali Al-Haj
:
An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol. J. Supercomput. 79(6): 6730-6755 (2023) - 2022
- [j20]Nour Kittawi, Ali Al-Haj
:
Reversible data hiding using bit flipping and histogram shifting. Multim. Tools Appl. 81(9): 12441-12458 (2022) - [j19]Wala Etoom, Ali Al-Haj
:
A robust and imperceptible watermarking method for 3D DIBR images. Multim. Tools Appl. 81(20): 28165-28182 (2022) - [j18]Islam Alshawish, Ali Al-Haj
:
An efficient mutual authentication scheme for IoT systems. J. Supercomput. 78(14): 16056-16087 (2022) - 2021
- [j17]Heba Abdel-Nabi
, Ali Al-Haj
:
Reversible data hiding in adjacent zeros. Multim. Syst. 27(2): 229-245 (2021) - [j16]Ali Al-Haj
, Heba Abdel-Nabi
:
An efficient watermarking algorithm for medical images. Multim. Tools Appl. 80(17): 26021-26047 (2021) - [j15]Amit Kumar Singh, Q. M. Jonathan Wu, Ali Al-Haj, Calton Pu:
Introduction to the Special Section on Security and Privacy of Medical Data for Smart Healthcare. ACM Trans. Internet Techn. 21(3): 53:1-53:4 (2021)
2010 – 2019
- 2019
- [j14]Ahmad A. Mohammad
, Ali Al-Haj, Mahmoud E. Farfoura
:
An improved capacity data hiding technique based on image interpolation. Multim. Tools Appl. 78(6): 7181-7205 (2019) - [i1]Ali M. Al-Haj:
Forensics Analysis of Xbox One Game Console. CoRR abs/1904.00734 (2019) - 2017
- [j13]Ali Al-Haj, Ahmad A. Mohammad
, Alaa' Amer:
Crypto-Watermarking of Transmitted Medical Images. J. Digit. Imaging 30(1): 26-38 (2017) - 2016
- [j12]Mahmoud E. Farfoura
, Shi-Jinn Horng, Jing-Ming Guo, Ali Al-Haj:
Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multim. Tools Appl. 75(13): 7465-7493 (2016) - 2015
- [j11]Ali Al-Haj, Gheith A. Abandah
, Noor Hussein:
Crypto-based algorithms for secured medical image transmission. IET Inf. Secur. 9(6): 365-373 (2015) - [j10]Ali Al-Haj:
Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images. J. Digit. Imaging 28(2): 179-187 (2015) - [c5]Ali Al-Haj, Yazan Salman:
A watermarking scheme for DIBR images. IC3D 2015: 1-6 - 2014
- [j9]Ali Al-Haj:
An imperceptible and robust audio watermarking algorithm. EURASIP J. Audio Speech Music. Process. 2014: 37 (2014) - [j8]Ali Al-Haj, Alaa' Amer:
Secured Telemedicine Using Region-Based Watermarking with Tamper Localization. J. Digit. Imaging 27(6): 737-750 (2014) - [j7]Ali Al-Haj:
A dual transform audio watermarking algorithm. Multim. Tools Appl. 73(3): 1897-1912 (2014) - 2011
- [j6]Ali Al-Haj, Ahmad A. Mohammad, Lama Bata:
DWT-based audio watermarking. Int. Arab J. Inf. Technol. 8(3): 326-333 (2011) - 2010
- [c4]Ali Al-Haj, Christina Twal, Ahmad A. Mohammad
:
Hybrid DWT-SVD audio watermarking. ICDIM 2010: 525-529 - [c3]Ali Al-Haj, Ashraf Odeh, Shadi Rasheed Masadeh:
Copyright Protection of Relational Database Systems. NDT (1) 2010: 143-150
2000 – 2009
- 2009
- [j5]Ali M. Al-Haj, Tuqa Manasrah:
SVD-Based Image Water marking. J. Digit. Inf. Manag. 7(2): 83-89 (2009) - 2008
- [j4]Ahmad A. Mohammad
, Ali Al-Haj, Sameer Shaltaf:
An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Process. 88(9): 2158-2180 (2008) - 2007
- [j3]Ali M. Al-Haj:
FPGA-Based Implementations of Quadrature Mirror Filter Banks. Int. J. Comput. Their Appl. 14(4): 242-249 (2007) - [c2]Ali M. Al-Haj, Tuqa Manasrah:
Non-invertible copyright protection of digital images using DWT and SVD. ICDIM 2007: 448-453 - [c1]Ali Al-Haj:
FPGA-Based Quadrature Mirror Filters for DSP Applications. SITIS 2007: 581-584 - 2005
- [j2]Ali Al-Haj:
A Parallel FPGA-Based Implementation of the Discrete Wavelet Transform. Aust. J. Intell. Inf. Process. Syst. 8(4): 206-211 (2005) - [j1]Ali M. Al-Haj:
An FPGA-Based Parallel Distributed Arithmetic Implementation of the 1-D Discrete Wavelet Transform. Informatica (Slovenia) 29(2): 241-247 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint