Nematollah Zarmehi

Orcid: 0000-0002-9208-2941

According to our database1, Nematollah Zarmehi authored at least 15 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A Fast Iterative Method for Removing Impulsive Noise From Sparse Signals.
IEEE Trans. Circuits Syst. Video Technol., 2021

Achievable Secrecy Rate for the Relay Eavesdropper Channel with Non-Causal State Available at Transmitter and Relay.
CoRR, 2021

2020
Low Rank and Sparse Decomposition for Image and Video Applications.
IEEE Trans. Circuits Syst. Video Technol., 2020

2019
Removal of sparse noise from sparse signals.
Signal Process., 2019

A Fast Iterative Method for Removing Sparse Noise from Sparse Signals.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

2018
A multiplicative video watermarking robust to H.264/AVC compression standard.
Signal Process. Image Commun., 2018

Sparse and low-rank recovery using adaptive thresholding.
Digit. Signal Process., 2018

Iterative Method for Fusion of Infrared and Visible Images.
Proceedings of the 9th International Symposium on Telecommunications, 2018

2017
Robust Video Watermarking against H.264 and H.265 Compression Attacks.
CoRR, 2017

Comparison of Uniform and Random Sampling for Speech and Music Signals.
CoRR, 2017

Recovery of Sparse and Low Rank Components of Matrices Using Iterative Method with Adaptive Thresholding.
CoRR, 2017

2016
Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling.
ISC Int. J. Inf. Secur., 2016

Digital video steganalysis toward spread spectrum data hiding.
IET Image Process., 2016

2014
Video steganalysis of multiplicative spread spectrum steganography.
Proceedings of the 22nd European Signal Processing Conference, 2014

2013
Optimum decoder for an additive video watermarking with Laplacian noise in H.264.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013


  Loading...