Information hiding using steganography MM Amin, M Salleh, S Ibrahim, MR Katmin, MZI Shamsuddin 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003 | 251 | 2003 |
Information hiding using steganography MM Amin, M Salleh, S Ibrahim, MR Katmin, MZI Shamsuddin 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003 | 251 | 2003 |
Enhanced chaotic image encryption algorithm based on Baker's map M Salleh, S Ibrahim, IF Isnin Proceedings of the 2003 International Symposium on Circuits and Systems …, 2003 | 88 | 2003 |
Secure E-voting with blind signature S Ibrahim, M Kamat, M Salleh, SRA Aziz 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003 | 86 | 2003 |
Image encryption algorithm based on chaotic mapping M Salleh, S Ibrahim, IF Isnin Jurnal Teknologi, 1–12-1–12, 2003 | 70 | 2003 |
Fast algorithm for iris localization using Daugman circular integro differential operator M Shamsi, PB Saad, SB Ibrahim, AR Kenari 2009 International Conference of Soft Computing and Pattern Recognition, 393-398, 2009 | 59 | 2009 |
Adaptive image steganography based on optimal embedding and robust against chi-square attack O Zanganeh, S Ibrahim Information Technology Journal 10 (7), 1285-1294, 2011 | 33 | 2011 |
A Steganography Method Based on Hiding secrete data in MPEG/Audio Layer III MS Atoum, M Suleiman, A Rababaa, S Ibrahim, A Ahmed Journal of Computer Science 11 (5), 184-188, 2011 | 32 | 2011 |
Detecting sim box fraud using neural network AH Elmi, S Ibrahim, R Sallehuddin IT Convergence and Security 2012, 575-582, 2013 | 31 | 2013 |
Iris biometric cryptography for identity document SH Moi, NBA Rahim, P Saad, PL Sim, Z Zakaria, S Ibrahim 2009 International Conference of Soft Computing and Pattern Recognition, 736-741, 2009 | 31 | 2009 |
Least significant bit image steganography using particle swarm optimization and optical pixel adjustment P Gerami, S Ebrahim, M Bashardoost International Journal of Computer Applications 55 (2), 2012 | 27 | 2012 |
A new approach for relational database watermarking using image HM Sardroudi, S Ibrahim 5th International Conference on Computer Sciences and Convergence …, 2010 | 26 | 2010 |
Exploring the challenges of MP3 audio steganography MS Atoum, S Ibrahimn, G Sulong, A Zeki, A Abubakar 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 24 | 2013 |
MP3 steganography MS Atoum, S Ibrahim, G Sulong, M Ali International Journal of Computer Science Issues (IJCSI) 9 (6), 236, 2012 | 24 | 2012 |
MP3 steganography MS Atoum, S Ibrahim, G Sulong, M Ali International Journal of Computer Science Issues (IJCSI) 9 (6), 236, 2012 | 24 | 2012 |
A new method for audio steganography using message integrity MS Atoum, S Ibrahim, G Sulong, M Zamani Journal of Convergence Information Technology 8 (14), 35, 2013 | 22 | 2013 |
Adaptive steganography scheme using more surrounding pixels M Afrakhteh, S Ibrahim 2010 International Conference On Computer Design and Applications 1, V1-225 …, 2010 | 19 | 2010 |
Classification of sim box fraud detection using support vector machine and artificial neural network R Sallehuddin, S Ibrahim, A Hussein Elmi International Journal of Innovative Computing 4 (2), 2014 | 18 | 2014 |
Error correction on iris biometric template using Reed Solomon codes SH Moi, P Saad, N Abd Rahim, S Ibrahim 2010 Fourth Asia International Conference on Mathematical/Analytical …, 2010 | 18 | 2010 |
Steganography: random LSB insertion using discrete logarithm MM Amin, M Salleh, S Ibrahim, MR Katmin Proceedings of 3rd International Conference on Information Technology in …, 2003 | 15 | 2003 |