Image steganography in spatial domain: A survey M Hussain, AWA Wahab, YIB Idris, ATS Ho, KH Jung Signal Processing: Image Communication 65, 46-66, 2018 | 567 | 2018 |
A survey of image steganography techniques M Hussain, M Hussain Int. J. Adv. Sci. Technol 54 (3), 113-124, 2013 | 314 | 2013 |
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement M Hussain, AWA Wahab, ATS Ho, N Javed, KH Jung Signal Processing: Image Communication 50, 44-57, 2017 | 116 | 2017 |
High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution AA Zakaria, M Hussain, AWA Wahab, MYI Idris, NA Abdullah, KH Jung Applied Sciences 8 (11), 2199, 2018 | 73 | 2018 |
Pixel intensity based high capacity data embedding method M Hussain, M Hussain 2010 International Conference on Information and Emerging Technologies, 1-5, 2010 | 64 | 2010 |
Recursive information hiding scheme through LSB, PVD shift, and MPE M Hussain, AWA Wahab, N Javed, KH Jung IETE Technical Review 35 (1), 53-63, 2018 | 57 | 2018 |
Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images M Hussain, AW Abdul Wahab, N Javed, KH Jung Symmetry 8 (6), 41, 2016 | 53 | 2016 |
A high bandwidth covert channel in network protocol M Hussain, M Hussain 2011 International Conference on Information and Communication Technologies, 1-6, 2011 | 38 | 2011 |
Enhanced adaptive data hiding method using LSB and pixel value differencing M Hussain, Q Riaz, S Saleem, A Ghafoor, KH Jung Multimedia Tools and Applications 80, 20381-20401, 2021 | 35 | 2021 |
Application of Data Mining Using Artificial Neural Network: Survey Arif Muhammad, Khubaib Amjad Alam, Mehdi Hussain International Journal of Database Theory and Application (ISSN: 2005 - 4270 …, 2015 | 35* | 2015 |
What Lies Beneath One’s Feet? Terrain Classification Using Inertial Data of Human Walk MS Muhammad Zeeshan Ul Hasnain Hashmi , Qaiser Riaz, Mehdi Hussain Applied Sciences 9 (15), 3099, 2019 | 32 | 2019 |
Forensic analysis of tor browser on windows 10 and android 10 operating systems MR Arshad, M Hussain, H Tahir, S Qadir, FIA Memon, Y Javed IEEE Access 9, 141273-141294, 2021 | 30 | 2021 |
Permissions-Based Detection of Android Malware Using Machine Learning F Akbar, M Hussain, R Mumtaz, Q Riaz, AWA Wahab, KH Jung Symmetry 14 (4), 718, 2022 | 28 | 2022 |
Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App A Afzal, M Hussain, S Saleem, MK Shahzad, ATS Ho, KH Jung Applied Sciences 11 (17), 7789, 2021 | 28 | 2021 |
Embedding data in edge boundaries with high PSNR M Hussain, M Hussain 2011 7th International Conference on Emerging Technologies, 1-6, 2011 | 28 | 2011 |
GAFOR: genetic algorithm based fuzzy optimized re-clustering in wireless sensor networks MK Shahzad, SMR Islam, M Hossain, M Abdullah-Al-Wadud, A Alamri, ... Mathematics 9 (1), 43, 2020 | 27 | 2020 |
Pixel value differencing steganography techniques: Analysis and open challenge Mehdi Hussain, Ainuddin Wahid Abdul Wahab , Anuar N.B., Salleh R, Noor R.M Consumer Electronics - Taiwan (ICCE-TW), 2015 IEEE International Conference …, 2015 | 24* | 2015 |
Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review L Mohammadpour, M Hussain, A Aryanfar, V Maleki, F Sattar International Journal of Security and Its Applications 9 (09), 225-234, 2015 | 23 | 2015 |
Spatial domain lossless image data compression method SA Hassan, M Hussain 2011 International Conference on Information and Communication Technologies, 1-4, 2011 | 23 | 2011 |
A secure architecture for open source VoIP solutions F Sattar, M Hussain, K Nisar 2011 international conference on information and communication technologies, 1-6, 2011 | 20 | 2011 |