Information hiding using steganography MM Amin, M Salleh, S Ibrahim, MR Katmin, MZI Shamsuddin 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003 | 264 | 2003 |
Secure E-voting with blind signature S Ibrahim, M Kamat, M Salleh, SRA Aziz 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 …, 2003 | 105 | 2003 |
Enhanced chaotic image encryption algorithm based on Baker's map M Salleh, S Ibrahim, IF Isnin Proceedings of the 2003 International Symposium on Circuits and Systems …, 2003 | 88 | 2003 |
Image encryption algorithm based on chaotic mapping M Salleh, S Ibrahim, IF Isnin Jurnal Teknologi, 1–12-1–12, 2003 | 78 | 2003 |
Fast algorithm for iris localization using Daugman circular integro differential operator M Shamsi, PB Saad, SB Ibrahim, AR Kenari 2009 International Conference of Soft Computing and Pattern Recognition, 393-398, 2009 | 61 | 2009 |
Detecting sim box fraud using neural network AH Elmi, S Ibrahim, R Sallehuddin IT Convergence and Security 2012, 575-582, 2013 | 40 | 2013 |
Adaptive image steganography based on optimal embedding and robust against chi-square attack O Zanganeh, S Ibrahim Information Technology Journal 10 (7), 1285-1294, 2011 | 40 | 2011 |
Iris biometric cryptography for identity document SH Moi, NBA Rahim, P Saad, PL Sim, Z Zakaria, S Ibrahim 2009 International Conference of Soft Computing and Pattern Recognition, 736-741, 2009 | 38 | 2009 |
A Steganography Method Based on Hiding secrete data in MPEG/Audio Layer III MS Atoum, M Suleiman, A Rababaa, S Ibrahim, A Ahmed Journal of Computer Science 11 (5), 184-188, 2011 | 33 | 2011 |
A new approach for relational database watermarking using image HM Sardroudi, S Ibrahim 5th International Conference on Computer Sciences and Convergence …, 2010 | 31 | 2010 |
Exploring the challenges of MP3 audio steganography MS Atoum, S Ibrahimn, G Sulong, A Zeki, A Abubakar 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 28 | 2013 |
Least significant bit image steganography using particle swarm optimization and optical pixel adjustment P Gerami, S Ebrahim, M Bashardoost International Journal of Computer Applications 55 (2), 2012 | 28 | 2012 |
A new method for audio steganography using message integrity MS Atoum, S Ibrahim, G Sulong, M Zamani Journal of Convergence Information Technology 8 (14), 35, 2013 | 26 | 2013 |
MP3 steganography MS Atoum, S Ibrahim, G Sulong, M Ali International Journal of Computer Science Issues (IJCSI) 9 (6), 236, 2012 | 26 | 2012 |
Detecting SIM box fraud by using support vector machine and artificial neural network R Sallehuddin, S Ibrahim, AM Zain, AH Elmi Jurnal Teknologi 74 (1), 2015 | 24 | 2015 |
Economics of fresh tomato marketing in Kosofe local government area of Lagos State, Nigeria AE Obayelu, AO Arowolo, SB Ibrahim, AQ Croffie Nigerian Journal of Agricultural Economics 4 (1), 58-67, 2014 | 21 | 2014 |
Classification of sim box fraud detection using support vector machine and artificial neural network R Sallehuddin, S Ibrahim, A Hussein Elmi International Journal of Innovative Computing 4 (2), 2014 | 20 | 2014 |
Adaptive steganography scheme using more surrounding pixels M Afrakhteh, S Ibrahim 2010 International Conference On Computer Design and Applications 1, V1-225 …, 2010 | 19 | 2010 |
Error correction on iris biometric template using reed solomon codes SH Moi, P Saad, N Abd Rahim, S Ibrahim 2010 Fourth Asia International Conference on Mathematical/Analytical …, 2010 | 19 | 2010 |
MRK atmin, and MZI Shamsuddin “Information Hiding using Steganography” 4* National Conference on Telecommunication Technology Proceedings MM Amin, M Salleh, S Ibrahim Shah Alam, Malaysia, 2003 | 17 | 2003 |