Image steganography techniques: an overview N Hamid, A Yahya, RB Ahmad, OM Al-Qershi International Journal of Computer Science and Security (IJCSS) 6 (3), 168-187, 2012 | 269 | 2012 |
A Comparison between using SIFT and SURF for characteristic region based image steganography N Hamid, A Yahya, RB Ahmad, OM Al-Qershi International Journal of Computer Science Issues (IJCSI) 9 (3), 110, 2012 | 40 | 2012 |
Characteristic region based image steganography using speeded-up robust features technique N Hamid, A Yahya, RB Ahmad, O Al-Qershi 2012 International Conference on Future Communication Networks, 141-146, 2012 | 36 | 2012 |
Steganography in image files: A survey N Hamid, A Yahya, RB Ahmad, D Najim, L Kanaan Australian Journal of Basic and Applied Sciences 7 (1), 35-55, 2013 | 20 | 2013 |
Secured and robust information hiding scheme NH Abdul-Mahdi, A Yahya, RB Ahmad, OM Al-Qershi Procedia Engineering 53, 463-471, 2013 | 17 | 2013 |
Enhancing visual quality of spatial image steganography using SqueezeNet deep learning network N Hamid, BS Sumait, BI Bakri, O Al-Qershi Multimedia Tools and Applications 80 (28), 36093-36109, 2021 | 15 | 2021 |
An improved robust and secured image Steganographic scheme N Hamid, A Yahya, RB Ahmad, OM Al-Qershi International Journal of Electronics and Communication Engineering …, 2012 | 11 | 2012 |
Enhancing the robustness of digital image steganography using ECC and redundancy N Hamid, A Yahya, RB Ahmad, D Najim, L Kanaan WULFENIA Journal 20 (4), 153-169, 2013 | 9 | 2013 |
Osamah M,“Image Stega nography Techniques: An Over-vievv” N Hamid, A Yahya, RB Ahmad International Journal of computer science and securi-ty 6 (3), 2O12, 0 | 5 | |
Image Steganography Techniques: An Overview,‖ in International Journal of Computer Science and Security (IJCSS) N Hamid, A Yahya, RB Ahmad, OM Al-Qershi Volume (6), 2012 | 3 | 2012 |
Secured and robust information hiding scheme AM Nagham Hamed, Y Abid, R Badlishah, AQ Osamah M Elsevier BV, 2013 | | 2013 |
Robust and Secured Data Hiding Schemes Using Digital Image Steganography NH Abdul-Mahdi School of Computer and Communication Engineering, 2013 | | 2013 |
This item is protected by original copyright HC YONG UNIVERSITI MALAYSIA PERLIS, 2013 | | 2013 |
Blind image Steganography scheme using speeded-up robust features technique H Nagham, Y Abid, R Badlishah, M Osamah Universiti Malaysia Perlis (UniMAP), 2012 | | 2012 |