Mehdi Hussain
Title
Cited by
Cited by
Year
A survey of image steganography techniques
M Hussain, M Hussain
Int. J. Adv. Sci. Technol 54 (3), 113-124, 2013
2552013
Image steganography in spatial domain: A survey
M Hussain, AWA Wahab, YIB Idris, ATS Ho, KH Jung
Signal Processing: Image Communication 65, 46-66, 2018
2502018
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
M Hussain, AWA Wahab, ATS Ho, N Javed, KH Jung
Signal Processing: Image Communication 50, 44-57, 2017
732017
Pixel intensity based high capacity data embedding method
M Hussain, M Hussain
2010 International Conference on Information and Emerging Technologies, 1-5, 2010
522010
Recursive information hiding scheme through LSB, PVD shift, and MPE
M Hussain, AWA Wahab, N Javed, KH Jung
IETE Technical Review 35 (1), 53-63, 2018
382018
Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images
M Hussain, AW Abdul Wahab, N Javed, KH Jung
Symmetry 8 (6), 41, 2016
362016
A high bandwidth covert channel in network protocol
M Hussain, M Hussain
2011 International Conference on Information and Communication Technologies, 1-6, 2011
342011
Application of Data Mining Using Artificial Neural Network: Survey
Arif Muhammad, Khubaib Amjad Alam, Mehdi Hussain
International Journal of Database Theory and Application (ISSN: 2005 - 4270 …, 2015
29*2015
Embedding data in edge boundaries with high PSNR
M Hussain, M Hussain
2011 7th International Conference on Emerging Technologies, 1-6, 2011
282011
High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution
AA Zakaria, M Hussain, AWA Wahab, MYI Idris, NA Abdullah, KH Jung
Applied Sciences 8 (11), 2199, 2018
222018
Pixel value differencing steganography techniques: Analysis and open challenge
Mehdi Hussain, Ainuddin Wahid Abdul Wahab , Anuar N.B., Salleh R, Noor R.M
Consumer Electronics - Taiwan (ICCE-TW), 2015 IEEE International Conference …, 2015
20*2015
Spatial domain lossless image data compression method
SA Hassan, M Hussain
2011 International Conference on Information and Communication Technologies, 1-4, 2011
182011
Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Ishrat Batool, Muhammad Arif
International Journal of Security and Its Applications (ISSN 1738-9976) 9 (2 …, 2015
14*2015
Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review
L Mohammadpour, M Hussain, A Aryanfar, V Maleki, F Sattar
International Journal of Security and Its Applications 9 (09), 225-234, 2015
132015
Intelligent agent based architectures for e-learning system: survey
M Arif, M Hussain
International Journal of u-and e-Service, Science and Technology 8 (6), 9-24, 2015
102015
Apparatus and method for automatic license plate recognition and traffic surveillance
MA Khan, SM Ziauddin, I ul Haq, N Mehmood, M Hussain, SA Hassan, ...
US Patent App. 14/633,570, 2015
82015
Information hiding using edge boundaries of objects
M Hussain, M Hussain
International Journal of Security and its applications 5 (3), 1-10, 2011
82011
What Lies Beneath One’s Feet? Terrain Classification Using Inertial Data of Human Walk
MS Muhammad Zeeshan Ul Hasnain Hashmi , Qaiser Riaz, Mehdi Hussain
Applied Sciences 9 (15), 3099, 2019
72019
Crime Mining: A Comprehensive Survey
Arif Muhammad, Khubaib Amjad Alam, Mehdi Hussain
International Journal of u- and e- Service, Science and Technology, IJUNESST …, 2015
7*2015
Characterizing Strengths of Snort-based IDPS
Ghilman Ahmed, Mehdi Hussain, M.N.A. Khan
Research Journal of Recent Sciences 3, 88-94, 2014
5*2014
The system can't perform the operation now. Try again later.
Articles 1–20