Information hiding using steganography MM Amin, M Salleh, S Ibrahim, MR Katmin, MZI Shamsuddin 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003 | 261 | 2003 |
Information hiding using steganography MM Amin, M Salleh, S Ibrahim, MR Katmin, MZI Shamsuddin 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003 | 261 | 2003 |
Secure E-voting with blind signature S Ibrahim, M Kamat, M Salleh, SRA Aziz 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003 | 106 | 2003 |
Enhanced chaotic image encryption algorithm based on Baker's map M Salleh, S Ibrahim, IF Isnin Proceedings of the 2003 International Symposium on Circuits and Systems …, 2003 | 94 | 2003 |
Image encryption algorithm based on chaotic mapping M Salleh, S Ibrahim, IF Isnin Journal Teknologi 39 (D), 1-12, 2003 | 78 | 2003 |
Fast algorithm for iris localization using Daugman circular integro differential operator M Shamsi, PB Saad, SB Ibrahim, AR Kenari 2009 International Conference of Soft Computing and Pattern Recognition, 393-398, 2009 | 62 | 2009 |
Detecting sim box fraud using neural network AH Elmi, S Ibrahim, R Sallehuddin IT Convergence and Security 2012, 575-582, 2013 | 40 | 2013 |
Adaptive image steganography based on optimal embedding and robust against chi-square attack O Zanganeh, S Ibrahim Information Technology Journal 10 (7), 1285-1294, 2011 | 40 | 2011 |
Iris biometric cryptography for identity document SH Moi, NBA Rahim, P Saad, PL Sim, Z Zakaria, S Ibrahim 2009 International Conference of Soft Computing and Pattern Recognition, 736-741, 2009 | 36 | 2009 |
A Steganography Method Based on Hiding secrete data in MPEG/Audio Layer III MS Atoum, M Suleiman, A Rababaa, S Ibrahim, A Ahmed Journal of Computer Science 11 (5), 184-188, 2011 | 32 | 2011 |
A new approach for relational database watermarking using image HM Sardroudi, S Ibrahim 5th International Conference on Computer Sciences and Convergence …, 2010 | 29 | 2010 |
Exploring the challenges of MP3 audio steganography MS Atoum, S Ibrahimn, G Sulong, A Zeki, A Abubakar 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 27 | 2013 |
Least significant bit image steganography using particle swarm optimization and optical pixel adjustment P Gerami, S Ebrahim, M Bashardoost International Journal of Computer Applications 55 (2), 2012 | 27 | 2012 |
A new method for audio steganography using message integrity MS Atoum, S Ibrahim, G Sulong, M Zamani Journal of Convergence Information Technology 8 (14), 35, 2013 | 26 | 2013 |
MP3 steganography MS Atoum, S Ibrahim, G Sulong, A Ahmed Journal of Computer Science issues 9 (6), 2012 | 25 | 2012 |
MP3 steganography MS Atoum, S Ibrahim, G Sulong, A Ahmed Journal of Computer Science issues 9 (6), 2012 | 25 | 2012 |
Detecting SIM box fraud by using support vector machine and artificial neural network R Sallehuddin, S Ibrahim, AM Zain, AH Elmi Jurnal Teknologi 74 (1), 2015 | 22 | 2015 |
Adaptive steganography scheme using more surrounding pixels M Afrakhteh, S Ibrahim 2010 International Conference On Computer Design and Applications 1, V1-225 …, 2010 | 21 | 2010 |
Classification of sim box fraud detection using support vector machine and artificial neural network R Sallehuddin, S Ibrahim, A Hussein Elmi International Journal of Innovative Computing 4 (2), 2014 | 20 | 2014 |
Economics of fresh tomato marketing in Kosofe local government area of Lagos State, Nigeria AE Obayelu, AO Arowolo, SB Ibrahim, AQ Croffie Nigerian Journal of Agricultural Economics 4 (1), 58-67, 2014 | 19 | 2014 |