팔로우
Mehdi Hussain
제목
인용
인용
연도
Image steganography in spatial domain: A survey
M Hussain, AWA Wahab, YIB Idris, ATS Ho, KH Jung
Signal Processing: Image Communication 65, 46-66, 2018
4592018
A survey of image steganography techniques
M Hussain, M Hussain
Int. J. Adv. Sci. Technol 54 (3), 113-124, 2013
2872013
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
M Hussain, AWA Wahab, ATS Ho, N Javed, KH Jung
Signal Processing: Image Communication 50, 44-57, 2017
1112017
High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution
AA Zakaria, M Hussain, AWA Wahab, MYI Idris, NA Abdullah, KH Jung
Applied Sciences 8 (11), 2199, 2018
552018
Pixel intensity based high capacity data embedding method
M Hussain, M Hussain
2010 International Conference on Information and Emerging Technologies, 1-5, 2010
552010
Recursive information hiding scheme through LSB, PVD shift, and MPE
M Hussain, AWA Wahab, N Javed, KH Jung
IETE Technical Review 35 (1), 53-63, 2018
532018
Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images
M Hussain, AW Abdul Wahab, N Javed, KH Jung
Symmetry 8 (6), 41, 2016
462016
A high bandwidth covert channel in network protocol
M Hussain, M Hussain
2011 International Conference on Information and Communication Technologies, 1-6, 2011
362011
Application of Data Mining Using Artificial Neural Network: Survey
Arif Muhammad, Khubaib Amjad Alam, Mehdi Hussain
International Journal of Database Theory and Application (ISSN: 2005 - 4270 …, 2015
33*2015
Embedding data in edge boundaries with high PSNR
M Hussain, M Hussain
2011 7th International Conference on Emerging Technologies, 1-6, 2011
292011
Enhanced adaptive data hiding method using LSB and pixel value differencing
M Hussain, Q Riaz, S Saleem, A Ghafoor, KH Jung
Multimedia Tools and Applications 80 (13), 20381-20401, 2021
262021
Pixel value differencing steganography techniques: Analysis and open challenge
Mehdi Hussain, Ainuddin Wahid Abdul Wahab , Anuar N.B., Salleh R, Noor R.M
Consumer Electronics - Taiwan (ICCE-TW), 2015 IEEE International Conference …, 2015
23*2015
Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review
L Mohammadpour, M Hussain, A Aryanfar, V Maleki, F Sattar
International Journal of Security and Its Applications 9 (09), 225-234, 2015
222015
What Lies Beneath One’s Feet? Terrain Classification Using Inertial Data of Human Walk
MS Muhammad Zeeshan Ul Hasnain Hashmi , Qaiser Riaz, Mehdi Hussain
Applied Sciences 9 (15), 3099, 2019
212019
Spatial domain lossless image data compression method
SA Hassan, M Hussain
2011 International Conference on Information and Communication Technologies, 1-4, 2011
192011
Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Ishrat Batool, Muhammad Arif
International Journal of Security and Its Applications (ISSN 1738-9976) 9 (2 …, 2015
18*2015
Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems
MR Arshad, M Hussain, H Tahir, S Qadir, FI Memon, Y Javed
IEEE Access, 2021
162021
Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App
A Afzal, M Hussain, S Saleem, MK Shahzad, ATS Ho, KH Jung
Applied Sciences 11 (17), 7789, 2021
162021
GAFOR: Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor Networks
MK Shahzad, SM Islam, M Hossain, M Abdullah-Al-Wadud, A Alamri, ...
Mathematics 9 (1), 43, 2021
162021
A secure architecture for open source VoIP solutions
F Sattar, M Hussain, K Nisar
2011 international conference on information and communication technologies, 1-6, 2011
162011
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20