Segui
Mehdi Hussain
Titolo
Citata da
Citata da
Anno
Image steganography in spatial domain: A survey
M Hussain, AWA Wahab, YIB Idris, ATS Ho, KH Jung
Signal Processing: Image Communication 65, 46-66, 2018
4942018
A survey of image steganography techniques
M Hussain, M Hussain
Int. J. Adv. Sci. Technol 54 (3), 113-124, 2013
3002013
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
M Hussain, AWA Wahab, ATS Ho, N Javed, KH Jung
Signal Processing: Image Communication 50, 44-57, 2017
1132017
High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution
AA Zakaria, M Hussain, AWA Wahab, MYI Idris, NA Abdullah, KH Jung
Applied Sciences 8 (11), 2199, 2018
612018
Pixel intensity based high capacity data embedding method
M Hussain, M Hussain
2010 International Conference on Information and Emerging Technologies, 1-5, 2010
572010
Recursive information hiding scheme through LSB, PVD shift, and MPE
M Hussain, AWA Wahab, N Javed, KH Jung
IETE Technical Review 35 (1), 53-63, 2018
542018
Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images
M Hussain, AW Abdul Wahab, N Javed, KH Jung
Symmetry 8 (6), 41, 2016
502016
A high bandwidth covert channel in network protocol
M Hussain, M Hussain
2011 International Conference on Information and Communication Technologies, 1-6, 2011
352011
Application of Data Mining Using Artificial Neural Network: Survey
Arif Muhammad, Khubaib Amjad Alam, Mehdi Hussain
International Journal of Database Theory and Application (ISSN: 2005 - 4270 …, 2015
34*2015
Enhanced adaptive data hiding method using LSB and pixel value differencing
M Hussain, Q Riaz, S Saleem, A Ghafoor, KH Jung
Multimedia Tools and Applications 80 (13), 20381-20401, 2021
292021
Embedding data in edge boundaries with high PSNR
M Hussain, M Hussain
2011 7th International Conference on Emerging Technologies, 1-6, 2011
282011
What Lies Beneath One’s Feet? Terrain Classification Using Inertial Data of Human Walk
MS Muhammad Zeeshan Ul Hasnain Hashmi , Qaiser Riaz, Mehdi Hussain
Applied Sciences 9 (15), 3099, 2019
242019
Pixel value differencing steganography techniques: Analysis and open challenge
Mehdi Hussain, Ainuddin Wahid Abdul Wahab , Anuar N.B., Salleh R, Noor R.M
Consumer Electronics - Taiwan (ICCE-TW), 2015 IEEE International Conference …, 2015
23*2015
Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App
A Afzal, M Hussain, S Saleem, MK Shahzad, ATS Ho, KH Jung
Applied Sciences 11 (17), 7789, 2021
212021
Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review
L Mohammadpour, M Hussain, A Aryanfar, V Maleki, F Sattar
International Journal of Security and Its Applications 9 (09), 225-234, 2015
212015
Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems
MR Arshad, M Hussain, H Tahir, S Qadir, FI Memon, Y Javed
IEEE Access, 2021
192021
Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Ishrat Batool, Muhammad Arif
International Journal of Security and Its Applications (ISSN 1738-9976) 9 (2 …, 2015
19*2015
Spatial domain lossless image data compression method
SA Hassan, M Hussain
2011 International Conference on Information and Communication Technologies, 1-4, 2011
192011
GAFOR: Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor Networks
MK Shahzad, SM Islam, M Hossain, M Abdullah-Al-Wadud, A Alamri, ...
Mathematics 9 (1), 43, 2021
182021
A secure architecture for open source VoIP solutions
F Sattar, M Hussain, K Nisar
2011 international conference on information and communication technologies, 1-6, 2011
162011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20