Ali Al‐Haj

1.8k total citations
57 papers, 1.2k citations indexed

About

Ali Al‐Haj is a scholar working on Computer Vision and Pattern Recognition, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Ali Al‐Haj has authored 57 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 50 papers in Computer Vision and Pattern Recognition, 14 papers in Signal Processing and 5 papers in Computer Networks and Communications. Recurrent topics in Ali Al‐Haj's work include Advanced Steganography and Watermarking Techniques (42 papers), Chaos-based Image/Signal Encryption (31 papers) and Digital Media Forensic Detection (26 papers). Ali Al‐Haj is often cited by papers focused on Advanced Steganography and Watermarking Techniques (42 papers), Chaos-based Image/Signal Encryption (31 papers) and Digital Media Forensic Detection (26 papers). Ali Al‐Haj collaborates with scholars based in Jordan, United States and India. Ali Al‐Haj's co-authors include Ahmad Mohammad, Gheith A. Abandah, Mahmoud E. Farfoura, Heba Abdel-Nabi, Shi‐Jinn Horng, Jing-Ming Guo, Noor Hussein, François Chaumette, Christophe Collewet and Calton Pu and has published in prestigious journals such as Signal Processing, Measurement and Multimedia Tools and Applications.

In The Last Decade

Ali Al‐Haj

54 papers receiving 1.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ali Al‐Haj Jordan 18 1.1k 182 116 107 103 57 1.2k
Nazir A. Loan India 13 884 0.8× 105 0.6× 88 0.8× 110 1.0× 130 1.3× 17 1.0k
Jiwu Huang China 19 1.4k 1.2× 165 0.9× 207 1.8× 70 0.7× 92 0.9× 41 1.5k
Zhenxing Qian China 26 2.2k 2.0× 144 0.8× 77 0.7× 79 0.7× 314 3.0× 103 2.3k
Martin Kutter Switzerland 12 2.3k 2.0× 238 1.3× 107 0.9× 142 1.3× 108 1.0× 19 2.3k
Basant Kumar India 14 601 0.5× 66 0.4× 91 0.8× 62 0.6× 90 0.9× 39 714
Der‐Chyuan Lou Taiwan 19 988 0.9× 85 0.5× 47 0.4× 214 2.0× 260 2.5× 92 1.2k
Norishige Morimoto Japan 5 2.2k 2.0× 278 1.5× 58 0.5× 152 1.4× 179 1.7× 6 2.3k
Wei‐Liang Tai Taiwan 17 1.6k 1.4× 96 0.5× 30 0.3× 161 1.5× 122 1.2× 45 1.7k
Chwei‐Shyong Tsai Taiwan 19 1.1k 1.0× 117 0.6× 33 0.3× 223 2.1× 226 2.2× 45 1.4k
Gwoboa Horng Taiwan 16 812 0.7× 83 0.5× 49 0.4× 189 1.8× 296 2.9× 69 1.1k

Countries citing papers authored by Ali Al‐Haj

Since Specialization
Citations

This map shows the geographic impact of Ali Al‐Haj's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ali Al‐Haj with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ali Al‐Haj more than expected).

Fields of papers citing papers by Ali Al‐Haj

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ali Al‐Haj. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ali Al‐Haj. The network helps show where Ali Al‐Haj may publish in the future.

Co-authorship network of co-authors of Ali Al‐Haj

This figure shows the co-authorship network connecting the top 25 collaborators of Ali Al‐Haj. A scholar is included among the top collaborators of Ali Al‐Haj based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ali Al‐Haj. Ali Al‐Haj is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Al‐Haj, Ali, et al.. (2022). An efficient mutual authentication scheme for IoT systems. The Journal of Supercomputing. 78(14). 16056–16087. 10 indexed citations
2.
Al‐Haj, Ali, et al.. (2022). High-Performance Hardware Implementation of the KATAN Lightweight Cryptographic Cipher. Journal of Circuits Systems and Computers. 32(1). 1 indexed citations
3.
Al‐Haj, Ali, et al.. (2018). Providing security for NFC-based payment systems using a management authentication server. 184–187. 9 indexed citations
4.
Al‐Haj, Ali, et al.. (2017). Reversible data hiding in encrypted images. 2. 808–813. 40 indexed citations
5.
Al‐Haj, Ali, et al.. (2017). Digital image security based on data hiding and cryptography. 437–440. 14 indexed citations
6.
Al‐Haj, Ali, Noor Hussein, & Gheith A. Abandah. (2016). Combining cryptography and digital watermarking for secured transmission of medical images. 40–46. 14 indexed citations
7.
Al‐Haj, Ali, et al.. (2016). Crypto-Watermarking of Transmitted Medical Images. Journal of Digital Imaging. 30(1). 26–38. 33 indexed citations
8.
Al‐Haj, Ali, et al.. (2015). A watermarking scheme for DIBR images. 5291. 1–6. 5 indexed citations
9.
Al‐Haj, Ali, et al.. (2015). A Blind DWT-SCHUR Based Digital Video Watermarking Technique. Journal of Software Engineering and Applications. 8(4). 224–233. 24 indexed citations
10.
Al‐Haj, Ali, et al.. (2015). Crypto‐based algorithms for secured medical image transmission. IET Information Security. 9(6). 365–373. 66 indexed citations
11.
Al‐Haj, Ali, et al.. (2014). Secured Telemedicine Using Region-Based Watermarking with Tamper Localization. Journal of Digital Imaging. 27(6). 737–750. 51 indexed citations
12.
Al‐Haj, Ali. (2014). Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images. Journal of Digital Imaging. 28(2). 179–187. 35 indexed citations
13.
Al‐Haj, Ali. (2013). A dual transform audio watermarking algorithm. Multimedia Tools and Applications. 73(3). 1897–1912. 16 indexed citations
14.
Al‐Haj, Ali, et al.. (2011). DWT-Based Audio Watermarking. The International Arab Journal of Information Technology. 8. 326–333. 39 indexed citations
15.
Al‐Haj, Ali, et al.. (2010). Hybrid DWT-SVD audio watermarking. 525–529. 17 indexed citations
16.
Al‐Haj, Ali, et al.. (2008). Performance Optimization of Discrete Wavelets Transform Based Image Watermarking Using Genetic Algorithms. Journal of Computer Science. 4(10). 834–841. 11 indexed citations
17.
Mohammad, Ahmad, et al.. (2008). An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing. 88(9). 2158–2180. 122 indexed citations
18.
Al‐Haj, Ali, et al.. (2008). Management of medical images using wavelets-based multi-watermarking algorithm. 697–701. 7 indexed citations
19.
Al‐Haj, Ali, et al.. (1995). Text Retrieval Using Parallel Computers. 50. 85–86. 1 indexed citations
20.
Al‐Haj, Ali, et al.. (1994). Parallel Implementations of Back Propagation Networks on a Dynamic Data-Driven Multiprocessor. IEICE Transactions on Information and Systems. 77(5). 579–588. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026