


default search action
Bee Ee Khoo
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j18]Yusuf Abas Mohamed, Bee Ee Khoo, Mohd Shahrimie Mohd Asaari, Mohd Ezane Aziz, Fattah Rahiman Ghazali:
Decoding the black box: Explainable AI (XAI) for cancer diagnosis, prognosis, and treatment planning-A state-of-the art systematic review. Int. J. Medical Informatics 193: 105689 (2025) - 2023
- [c16]Muntadher H. Al-Hadaad, Rasha Thabit
, Khamis A. Zidan
, Bee Ee Khoo
:
Face Image Authentication Scheme Based on Cohen-Daubechies-Feauveau Wavelets. RoViSP 2023: 553-564 - 2022
- [c15]Zahraa Aqeel Salih, Rasha Thabit
, Khamis A. Zidan
, Bee Ee Khoo:
A new face image manipulation reveal scheme based on face detection and image watermarking. IICAIET 2022: 1-6 - 2021
- [c14]Yang Yang Lee
, Teck Seng Kong, Bee Ee Khoo:
Behavioural Study of Constrained Convolutional Neural Network on Image Splicing Classification of Various Datasets. RoViSP 2021: 474-480
2010 – 2019
- 2019
- [j17]Osamah M. Al-Qershi
, Bee Ee Khoo
:
Enhanced block-based copy-move forgery detection using k-means clustering. Multidimens. Syst. Signal Process. 30(4): 1671-1695 (2019) - [c13]Taha H. Rassem
, Nasrin M. Makbol
, Bee Ee Khoo
:
Performance Evaluation of Wavelet SVD-Based Watermarking Schemes for Color Images. ACeS 2019: 89-103 - [c12]Taha H. Rassem, Nasrin M. Makbol, Bee Ee Khoo:
Object Class Recognition using Combination of Colour Dense SIFT and Texture descriptors. AICCC 2019: 125-131 - [c11]Yee Yang Yap, Bee Ee Khoo:
Landmark-based Automated Guided Vehicle Localization Algorithm for Warehouse Application. EEET 2019: 47-54 - 2018
- [j16]Nasrin M. Makbol, Bee Ee Khoo
, Taha H. Rassem
:
Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multim. Tools Appl. 77(20): 26845-26879 (2018) - [j15]Osamah M. Al-Qershi
, Bee Ee Khoo
:
Evaluation of copy-move forgery detection: datasets and evaluation metrics. Multim. Tools Appl. 77(24): 31807-31833 (2018) - 2017
- [j14]Nasrin M. Makbol, Bee Ee Khoo, Taha H. Rassem
, Khaled Loukhaoukha:
A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf. Sci. 417: 381-400 (2017) - [j13]Rasha Thabit
, Bee Ee Khoo:
Medical image authentication using SLT and IWT schemes. Multim. Tools Appl. 76(1): 309-332 (2017) - 2016
- [j12]Nasrin M. Makbol, Bee Ee Khoo, Taha H. Rassem
:
Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process. 10(1): 34-52 (2016) - 2015
- [j11]Rasha Thabit
, Bee Ee Khoo
:
A new robust lossless data hiding scheme and its application to color medical images. Digit. Signal Process. 38: 77-94 (2015) - [j10]David Boon Liang Bong, Bee Ee Khoo
:
Objective blur assessment based on contraction errors of local contrast maps. Multim. Tools Appl. 74(17): 7355-7378 (2015) - [j9]Taha H. Rassem
, Bee Ee Khoo:
Performance evaluation of new colour histogram-based interest point detectors. Multim. Tools Appl. 74(24): 11357-11398 (2015) - [c10]Belinda Chong Chiew Meng, Umi Kalthum Ngah, Bee Ee Khoo, Ibrahim Lutfi Shuaib, Mohd Ezane Aziz
:
A Framework of MRI Fat Suppressed Imaging Fusion System for Femur Abnormality Analysis. KES 2015: 808-817 - 2014
- [j8]Nasrin M. Makbol, Bee Ee Khoo
:
A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit. Signal Process. 33: 134-147 (2014) - [j7]David Boon Liang Bong, Bee Ee Khoo
:
An Efficient and Training-Free Blind Image Blur Assessment in the Spatial Domain. IEICE Trans. Inf. Syst. 97-D(7): 1864-1871 (2014) - [j6]Rasha Thabit
, Bee Ee Khoo
:
Capacity improved robust lossless image watermarking. IET Image Process. 8(11): 662-670 (2014) - [j5]Rasha Thabit Mohammed
, Bee Ee Khoo
:
Robust reversible watermarking scheme using Slantlet transform matrix. J. Syst. Softw. 88: 74-86 (2014) - [j4]David Boon Liang Bong, Bee Ee Khoo
:
Blind image blur assessment by using valid reblur range and histogram shape difference. Signal Process. Image Commun. 29(6): 699-710 (2014) - [c9]Nasrin M. Makbol, Bee Ee Khoo
, Taha H. Rassem
:
Performance evaluation of SVD-based digital image watermarking scheme on print-scan and print-cam (PSPC) applications. ISPACS 2014: 48-53 - [c8]Osamah M. Al-Qershi
, Bee Ee Khoo:
Enhanced Matching Method for Copy-Move Forgery Detection by Means of Zernike Moments. IWDW 2014: 485-497 - 2013
- [j3]Osamah M. Al-Qershi
, Bee Ee Khoo
:
Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Signal Process. 93(1): 154-162 (2013) - [c7]Rasha Thabit Mohammed
, Bee Ee Khoo
:
Robust reversible watermarking scheme based on wavelet-like transform. ICSIPA 2013: 354-359 - [c6]Nasrin M. Makbol, Bee Ee Khoo
:
A Hybrid Robust Image Watermarking Scheme Using Integer Wavelet Transform, Singular Value Decomposition and Arnold Transform. IVIC 2013: 36-47 - 2012
- [c5]David B. L. Bong, Bee Ee Khoo
:
Image noise severity metric. ICDIP 2012: 83343I - 2011
- [j2]Osamah M. Al-Qershi
, Bee Ee Khoo
:
Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images. J. Digit. Imaging 24(1): 114-125 (2011) - [j1]Osamah M. Al-Qershi
, Bee Ee Khoo
:
High capacity data hiding schemes for medical images based on difference expansion. J. Syst. Softw. 84(1): 105-112 (2011) - [c4]Taha H. Rassem
, Bee Ee Khoo
:
New Color Image Histogram-Based Detectors. IVIC (1) 2011: 151-163
2000 – 2009
- 2007
- [c3]Chun Farn Leong
, Bee Ee Khoo
, Zalina B. binti Abdul Aziz:
Performance Analysis of Digital Image Fingerprinting Based on Design of Experiments. IIH-MSP 2007: 69-72 - 2002
- [c2]Kim Meng Liang, Mandava Rajeswari, Bee Ee Khoo:
Similarity measure determination from NURBS-warping method. ICARCV 2002: 1222-1227 - [c1]Kim Meng Liang, Mandava Rajeswari, Bee Ee Khoo:
Free Form Shape Representation Using NURBS Modeling. WSCG (Short Papers) 2002: 67-73
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint