Image steganography in spatial domain: A survey M Hussain, AWA Wahab, YIB Idris, ATS Ho, KH Jung Signal Processing: Image Communication 65, 46-66, 2018 | 551 | 2018 |
A survey of image steganography techniques M Hussain, M Hussain Int. J. Adv. Sci. Technol 54 (3), 113-124, 2013 | 313 | 2013 |
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement M Hussain, AWA Wahab, ATS Ho, N Javed, KH Jung Signal Processing: Image Communication 50, 44-57, 2017 | 117 | 2017 |
High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution AA Zakaria, M Hussain, AWA Wahab, MYI Idris, NA Abdullah, KH Jung Applied Sciences 8 (11), 2199, 2018 | 73 | 2018 |
Pixel intensity based high capacity data embedding method M Hussain, M Hussain 2010 International Conference on Information and Emerging Technologies, 1-5, 2010 | 64 | 2010 |
Recursive information hiding scheme through LSB, PVD shift, and MPE M Hussain, AWA Wahab, N Javed, KH Jung IETE Technical Review 35 (1), 53-63, 2018 | 55 | 2018 |
Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images M Hussain, AW Abdul Wahab, N Javed, KH Jung Symmetry 8 (6), 41, 2016 | 53 | 2016 |
A high bandwidth covert channel in network protocol M Hussain, M Hussain 2011 International Conference on Information and Communication Technologies, 1-6, 2011 | 38 | 2011 |
Application of Data Mining Using Artificial Neural Network: Survey Arif Muhammad, Khubaib Amjad Alam, Mehdi Hussain International Journal of Database Theory and Application (ISSN: 2005 - 4270 …, 2015 | 35* | 2015 |
Enhanced adaptive data hiding method using LSB and pixel value differencing M Hussain, Q Riaz, S Saleem, A Ghafoor, KH Jung Multimedia Tools and Applications 80, 20381-20401, 2021 | 33 | 2021 |
Forensic analysis of tor browser on windows 10 and android 10 operating systems MR Arshad, M Hussain, H Tahir, S Qadir, FIA Memon, Y Javed IEEE Access 9, 141273-141294, 2021 | 29 | 2021 |
What Lies Beneath One’s Feet? Terrain Classification Using Inertial Data of Human Walk MS Muhammad Zeeshan Ul Hasnain Hashmi , Qaiser Riaz, Mehdi Hussain Applied Sciences 9 (15), 3099, 2019 | 29 | 2019 |
Embedding data in edge boundaries with high PSNR M Hussain, M Hussain 2011 7th International Conference on Emerging Technologies, 1-6, 2011 | 28 | 2011 |
Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App A Afzal, M Hussain, S Saleem, MK Shahzad, ATS Ho, KH Jung Applied Sciences 11 (17), 7789, 2021 | 27 | 2021 |
Pixel value differencing steganography techniques: Analysis and open challenge Mehdi Hussain, Ainuddin Wahid Abdul Wahab , Anuar N.B., Salleh R, Noor R.M Consumer Electronics - Taiwan (ICCE-TW), 2015 IEEE International Conference …, 2015 | 24* | 2015 |
GAFOR: genetic algorithm based fuzzy optimized re-clustering in wireless sensor networks MK Shahzad, SMR Islam, M Hossain, M Abdullah-Al-Wadud, A Alamri, ... Mathematics 9 (1), 43, 2020 | 23 | 2020 |
Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review L Mohammadpour, M Hussain, A Aryanfar, V Maleki, F Sattar International Journal of Security and Its Applications 9 (09), 225-234, 2015 | 23 | 2015 |
Permissions-Based Detection of Android Malware Using Machine Learning F Akbar, M Hussain, R Mumtaz, Q Riaz, AWA Wahab, KH Jung Symmetry 14 (4), 718, 2022 | 22 | 2022 |
Spatial domain lossless image data compression method SA Hassan, M Hussain 2011 International Conference on Information and Communication Technologies, 1-4, 2011 | 21 | 2011 |
Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Ishrat Batool, Muhammad Arif International Journal of Security and Its Applications (ISSN 1738-9976) 9 (2 …, 2015 | 18* | 2015 |