Seguir
Mohsin Shah
Mohsin Shah
Assistant Professor Department of Telecommunication Hazara University Mansehra Pakistan
Email confirmado em hu.edu.pk
Título
Citado por
Citado por
Ano
A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform
TS Toqeer Mahmood , Zahid Mehmood , Mohsin Shah
Journal of Visual Communication and Image Representation 53, 202--214, 2018
1192018
Copy-move forgery detection technique for forensic analysis in digital images
T Mahmood, T Nawaz, A Irtaza, R Ashraf, M Shah, MT Mahmood
Mathematical Problems in Engineering 2016, 2016
922016
An improved image steganography technique based on MSB using bit differencing
AU Islam, F Khalid, M Shah, Z Khan, T Mahmood, A Khan, U Ali, ...
2016 Sixth International Conference on Innovative Computing Technology …, 2016
572016
Data hiding technique in Steganography for information security using number theory
AA Amjad Rehman, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah
Journal of Information Science 45 (6), 767--778, 2018
51*2018
A survey on block based copy move image forgery detection techniques
T Mahmood, T Nawaz, R Ashraf, M Shah, Z Khan, A Irtaza, Z Mehmood
2015 International Conference on Emerging Technologies (ICET), 1-6, 2015
492015
An efficient forensic technique for exposing region duplication forgery in digital images
T Mahmood, Z Mehmood, M Shah, Z Khan
Applied Intelligence 48 (7), 1791-1801, 2018
432018
Homomorphic Encryption-Based Reversible Data Hiding for 3D Mesh Models
MSWZHHHZT Mahmood
Arabian Journal for Science and Engineering 43 (12), 8145--8157, 2018
302018
Threshold-based steganography: a novel technique for improved payload and snr
DS Zakir Khan, Mohsin Shah, Muhammad Naeem, Toqeer Mahmood, Shah Khan, Noor ...
The International Arab Journal of Information Technology, 2016
282016
A new symmetric key encryption algorithm using images as secret keys
M Islam, M Shah, Z Khan, T Mahmood, MJ Khan
2015 13th International Conference on Frontiers of Information Technology …, 2015
252015
Forensic analysis of copy-move forgery in digital images using the stationary wavelets
T Mahmood, T Nawaz, Z Mehmood, Z Khan, M Shah, R Ashraf
2016 Sixth International Conference on Innovative Computing Technology …, 2016
192016
Implementation of secure AODV in MANET
R Akhtar, NU Amin, I Memon, M Shah
International Conference on Graphic and Image Processing (ICGIP 2012) 8768, 6-10, 2013
162013
Machine learning-based detection and classification of walnut fungi diseases
MA Khan, M Ali, M Shah, T Mahmood, M Ahmad, NZ Jhanjhi, ...
Intelligent Automation & Soft Computing 30 (3), 771-785, 2021
152021
Watermarking-based secure plaintext image protocols for storage, show, deletion and retrieval in the cloud
X Dong, W Zhang, M Shah, B Wang, N Yu
IEEE Transactions on Services Computing 15 (3), 1678-1692, 2020
132020
Copy-move forgery detection technique based on DWT and Hu Moments
HAH Toqeer Mahmood, Tabassam Nawaz, Mohsin Shah, Zakir Khan, Rehan Ashraf
International Journal of Computer Science and Information Security (IJCSIS …, 2016
132016
A passive technique for detecting copy-move forgeries by image feature matching
MA Toqeer Mahmood, Mohsin Shah, Junaid Rashid, Muhammad Wasif Nisar
Multimedia Tools and Applications, 1-24, 2020
10*2020
Paillier cryptosystem based mean value computation for encrypted domain image processing operations
NY Mohsin Shah, Weiming Zhang, Honggang Hu
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2019
82019
LSB steganography using bits complementation
Z Khan, M Shah, M Naeem, D Shahzad, T Mahmood
International Conference on Chemical Engineering and Advanced Computational …, 2014
82014
Survey on sentiment analysis of user reviews
S Naseem, T Mahmood, M Asif, J Rashid, M Umair, M Shah
2021 International Conference on Innovative Computing (ICIC), 1-6, 2021
62021
Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem
NY Mohsin Shah, Weiming Zhang, Honggang Hu, Xiaojuan Dong
IET Image Processing 13 (10), 1705--1713, 2019
62019
Threshold based LSB audio steganography
A Hakeem, NU Amin, M Shah, Z Khan, A Qadi
Int’l Conf. on Chemical Engineering & Advanced Computational Technologies, 88-92, 2014
62014
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20