Information hiding: A new approach in text steganography B Delina Proceedings of the International Conference on Applied Computer and Applied …, 2008 | 203 | 2008 |
Whitesteg: a new scheme in information hiding using text steganography LY Por, TF Ang, B Delina WSEAS transactions on computers 7 (6), 735-745, 2008 | 96 | 2008 |
An enhanced mechanism for image steganography using sequential colour cycle algorithm. LY Por, DB Yin, TF Ang, SY Ong Int. Arab J. Inf. Technol. 10 (1), 51-60, 2013 | 41 | 2013 |
StegCure: a comprehensive steganographic tool using enhanced LSB scheme LY Por, WK Lai, Z Alireza, TF Ang, MT Su, B Delina Delina, Faculty of Computer Science and Information Technology University of …, 2008 | 32 | 2008 |
A proposed approach for biometric-based authentication using of face and facial expression recognition DBM Yin, AA Mukhlas, RZW Chik, AT Othman, S Omar 2018 IEEE 3rd International Conference on Communication and Information …, 2018 | 26 | 2018 |
Fusion of face recognition and facial expression detection for authentication: a proposed model DBM Yin, S Omar, BA Talip, A Muklas, NAM Norain, AT Othman Proceedings of the 11th International Conference on Ubiquitous Information …, 2017 | 16 | 2017 |
Electronic door access control using MyAccess two-factor authentication scheme featuring near-field communication and eigenface-based face recognition using principal component … DB Mei Yin, MI Kamal, NS Azmanuddin, SHS Ali, AT Othman, RZW Chik Proceedings of the 10th International Conference on Ubiquitous Information …, 2016 | 13 | 2016 |
Development of a stepping force analgesic meter for a rat arthritic model MF Yam, LY Por, KK Peh, M Ahmad, MZ Asmawi, LF Ang, DBM Yin, ... Sensors 11, 5058-5070, 2011 | 5 | 2011 |
StegCure: an amalgamation of different steganographic methods in GIF image LY Por, WK Lai, Z Alireza, B Delina Proceedings of the 12th WSEAS international conference on Computers, 420-425, 2008 | 5 | 2008 |
A grid enabled E-theses and dissertations repository system SY Ong, D Beh, M Ismail The International Arab Journal of Information Technology 9 (4), 392-401, 2002 | 5 | 2002 |
An enhanced embedding method using inter-sentence, inter-word, end-of-line and inter-paragraph spacing LY Por, KO Chee, TF Ang, D Beh International Journal of the Physical Sciences 6 (36), 8130-8142, 2011 | 4 | 2011 |
A proposed model of online information grounds BA Talip, DBM Yin Proceedings of the 11th international conference on ubiquitous information …, 2017 | 3 | 2017 |
Information technology governance in Institute of Higher Learning in Malaysia: A systematic mapping study A Mukhlas, DBM Yinb, HS Husinc, BA Talipd, A Ahmade ASIA International Multidisciplinary Conference, 1-12, 2017 | 3 | 2017 |
IoT-Based Recycle Rebate System–Securing Website and Database HS Husin, AM Fairuz, D Beh Journal of Computing Technologies and Creative Content (JTec) 5 (2), 55-60, 2020 | 1 | 2020 |
Secure Data Transmission by Using Video Steganography MF Mustafa, DMY Beh Journal of Computing Technologies and Creative Content (JTeC) 3 (1), 15-21, 2018 | 1 | 2018 |
Multi-faction: multi-factor authentication using object detection, graphical password and voice authentication MAHQA Zarim, DBM Yin Journal of Computing Technologies and Creative Content (JTec) 1 (1), 30-33, 2016 | 1 | 2016 |
Silent secrecy: A hybrid steganographic scheme to conceal information DBM Yin, M Mahari, NS Azmanuddin, S Omar 2016 International Conference on Information and Communication Technology …, 2016 | 1 | 2016 |
Smart lock and smart alarm: alert and protect your lost USB flash drive DBM Yin, H Ramadhani, MSM Salleh Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 1 | 2014 |
Data hiding for image using sequential colour cycle algorithm D Beh University of Malaya, 2010 | 1 | 2010 |
Detecting Phishing Uniform Resource Locator (URL) using Machine Learning DMY Beh, R Bahuang Journal of Computing Technologies and Creative Content (JTec) 7 (2), 35-41, 2022 | | 2022 |