Follow
Subariah Ibrahim
Subariah Ibrahim
Verified email at fc.utm.my
Title
Cited by
Cited by
Year
Information hiding using steganography
MM Amin, M Salleh, S Ibrahim, MR Katmin, MZI Shamsuddin
4th National Conference of Telecommunication Technology, 2003. NCTT 2003†…, 2003
2512003
Information hiding using steganography
MM Amin, M Salleh, S Ibrahim, MR Katmin, MZI Shamsuddin
4th National Conference of Telecommunication Technology, 2003. NCTT 2003†…, 2003
2512003
Enhanced chaotic image encryption algorithm based on Baker's map
M Salleh, S Ibrahim, IF Isnin
Proceedings of the 2003 International Symposium on Circuits and Systems†…, 2003
882003
Secure E-voting with blind signature
S Ibrahim, M Kamat, M Salleh, SRA Aziz
4th National Conference of Telecommunication Technology, 2003. NCTT 2003†…, 2003
862003
Image encryption algorithm based on chaotic mapping
M Salleh, S Ibrahim, IF Isnin
Jurnal Teknologi, 1‚€“12-1‚€“12, 2003
702003
Fast algorithm for iris localization using Daugman circular integro differential operator
M Shamsi, PB Saad, SB Ibrahim, AR Kenari
2009 International Conference of Soft Computing and Pattern Recognition, 393-398, 2009
592009
Adaptive image steganography based on optimal embedding and robust against chi-square attack
O Zanganeh, S Ibrahim
Information Technology Journal 10 (7), 1285-1294, 2011
332011
A Steganography Method Based on Hiding secrete data in MPEG/Audio Layer III
MS Atoum, M Suleiman, A Rababaa, S Ibrahim, A Ahmed
Journal of Computer Science 11 (5), 184-188, 2011
322011
Detecting sim box fraud using neural network
AH Elmi, S Ibrahim, R Sallehuddin
IT Convergence and Security 2012, 575-582, 2013
312013
Iris biometric cryptography for identity document
SH Moi, NBA Rahim, P Saad, PL Sim, Z Zakaria, S Ibrahim
2009 International Conference of Soft Computing and Pattern Recognition, 736-741, 2009
312009
Least significant bit image steganography using particle swarm optimization and optical pixel adjustment
P Gerami, S Ebrahim, M Bashardoost
International Journal of Computer Applications 55 (2), 2012
272012
A new approach for relational database watermarking using image
HM Sardroudi, S Ibrahim
5th International Conference on Computer Sciences and Convergence†…, 2010
262010
Exploring the challenges of MP3 audio steganography
MS Atoum, S Ibrahimn, G Sulong, A Zeki, A Abubakar
2013 International Conference on Advanced Computer Science Applications and†…, 2013
242013
MP3 steganography
MS Atoum, S Ibrahim, G Sulong, M Ali
International Journal of Computer Science Issues (IJCSI) 9 (6), 236, 2012
242012
MP3 steganography
MS Atoum, S Ibrahim, G Sulong, M Ali
International Journal of Computer Science Issues (IJCSI) 9 (6), 236, 2012
242012
A new method for audio steganography using message integrity
MS Atoum, S Ibrahim, G Sulong, M Zamani
Journal of Convergence Information Technology 8 (14), 35, 2013
222013
Adaptive steganography scheme using more surrounding pixels
M Afrakhteh, S Ibrahim
2010 International Conference On Computer Design and Applications 1, V1-225†…, 2010
192010
Classification of sim box fraud detection using support vector machine and artificial neural network
R Sallehuddin, S Ibrahim, A Hussein Elmi
International Journal of Innovative Computing 4 (2), 2014
182014
Error correction on iris biometric template using Reed Solomon codes
SH Moi, P Saad, N Abd Rahim, S Ibrahim
2010 Fourth Asia International Conference on Mathematical/Analytical†…, 2010
182010
Steganography: random LSB insertion using discrete logarithm
MM Amin, M Salleh, S Ibrahim, MR Katmin
Proceedings of 3rd International Conference on Information Technology in†…, 2003
152003
The system can't perform the operation now. Try again later.
Articles 1–20