关注
Subariah Ibrahim
Subariah Ibrahim
在 fc.utm.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
Information hiding using steganography
MM Amin, M Salleh, S Ibrahim, MR Katmin, MZI Shamsuddin
4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003
2642003
Secure E-voting with blind signature
S Ibrahim, M Kamat, M Salleh, SRA Aziz
4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003
1052003
Enhanced chaotic image encryption algorithm based on Baker's map
M Salleh, S Ibrahim, IF Isnin
Proceedings of the 2003 International Symposium on Circuits and Systems …, 2003
882003
Image encryption algorithm based on chaotic mapping
M Salleh, S Ibrahim, IF Isnin
Jurnal Teknologi, 1–12-1–12, 2003
782003
Fast algorithm for iris localization using Daugman circular integro differential operator
M Shamsi, PB Saad, SB Ibrahim, AR Kenari
2009 International Conference of Soft Computing and Pattern Recognition, 393-398, 2009
612009
Detecting sim box fraud using neural network
AH Elmi, S Ibrahim, R Sallehuddin
IT Convergence and Security 2012, 575-582, 2013
402013
Adaptive image steganography based on optimal embedding and robust against chi-square attack
O Zanganeh, S Ibrahim
Information Technology Journal 10 (7), 1285-1294, 2011
402011
Iris biometric cryptography for identity document
SH Moi, NBA Rahim, P Saad, PL Sim, Z Zakaria, S Ibrahim
2009 International Conference of Soft Computing and Pattern Recognition, 736-741, 2009
382009
A Steganography Method Based on Hiding secrete data in MPEG/Audio Layer III
MS Atoum, M Suleiman, A Rababaa, S Ibrahim, A Ahmed
Journal of Computer Science 11 (5), 184-188, 2011
332011
A new approach for relational database watermarking using image
HM Sardroudi, S Ibrahim
5th International Conference on Computer Sciences and Convergence …, 2010
312010
Exploring the challenges of MP3 audio steganography
MS Atoum, S Ibrahimn, G Sulong, A Zeki, A Abubakar
2013 International Conference on Advanced Computer Science Applications and …, 2013
282013
Least significant bit image steganography using particle swarm optimization and optical pixel adjustment
P Gerami, S Ebrahim, M Bashardoost
International Journal of Computer Applications 55 (2), 2012
282012
A new method for audio steganography using message integrity
MS Atoum, S Ibrahim, G Sulong, M Zamani
Journal of Convergence Information Technology 8 (14), 35, 2013
262013
MP3 steganography
MS Atoum, S Ibrahim, G Sulong, M Ali
International Journal of Computer Science Issues (IJCSI) 9 (6), 236, 2012
262012
Detecting SIM box fraud by using support vector machine and artificial neural network
R Sallehuddin, S Ibrahim, AM Zain, AH Elmi
Jurnal Teknologi 74 (1), 2015
242015
Economics of fresh tomato marketing in Kosofe local government area of Lagos State, Nigeria
AE Obayelu, AO Arowolo, SB Ibrahim, AQ Croffie
Nigerian Journal of Agricultural Economics 4 (1), 58-67, 2014
212014
Classification of sim box fraud detection using support vector machine and artificial neural network
R Sallehuddin, S Ibrahim, A Hussein Elmi
International Journal of Innovative Computing 4 (2), 2014
202014
Adaptive steganography scheme using more surrounding pixels
M Afrakhteh, S Ibrahim
2010 International Conference On Computer Design and Applications 1, V1-225 …, 2010
192010
Error correction on iris biometric template using reed solomon codes
SH Moi, P Saad, N Abd Rahim, S Ibrahim
2010 Fourth Asia International Conference on Mathematical/Analytical …, 2010
192010
MRK atmin, and MZI Shamsuddin “Information Hiding using Steganography” 4* National Conference on Telecommunication Technology Proceedings
MM Amin, M Salleh, S Ibrahim
Shah Alam, Malaysia, 2003
172003
系统目前无法执行此操作,请稍后再试。
文章 1–20