Follow
Mohsin Shah
Mohsin Shah
Assistant Professor Department of Telecommunication Hazara University Mansehra Pakistan
Verified email at hu.edu.pk
Title
Cited by
Cited by
Year
A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform
TS Toqeer Mahmood , Zahid Mehmood , Mohsin Shah
Journal of Visual Communication and Image Representation 53, 202--214, 2018
1272018
Copy-move forgery detection technique for forensic analysis in digital images
T Mahmood, T Nawaz, A Irtaza, R Ashraf, M Shah, MT Mahmood
Mathematical Problems in Engineering 2016, 2016
982016
An improved image steganography technique based on MSB using bit differencing
AU Islam, F Khalid, M Shah, Z Khan, T Mahmood, A Khan, U Ali, ...
2016 Sixth International Conference on Innovative Computing Technology …, 2016
622016
Data hiding technique in Steganography for information security using number theory
AA Amjad Rehman, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah
Journal of Information Science 45 (6), 767--778, 2018
56*2018
A survey on block based copy move image forgery detection techniques
T Mahmood, T Nawaz, R Ashraf, M Shah, Z Khan, A Irtaza, Z Mehmood
2015 International Conference on Emerging Technologies (ICET), 1-6, 2015
502015
An efficient forensic technique for exposing region duplication forgery in digital images
T Mahmood, Z Mehmood, M Shah, Z Khan
Applied Intelligence 48 (7), 1791-1801, 2018
432018
Homomorphic Encryption-Based Reversible Data Hiding for 3D Mesh Models
MSWZHHHZT Mahmood
Arabian Journal for Science and Engineering 43 (12), 8145--8157, 2018
332018
Threshold-based steganography: a novel technique for improved payload and snr
DS Zakir Khan, Mohsin Shah, Muhammad Naeem, Toqeer Mahmood, Shah Khan, Noor ...
The International Arab Journal of Information Technology, 2016
282016
A new symmetric key encryption algorithm using images as secret keys
M Islam, M Shah, Z Khan, T Mahmood, MJ Khan
2015 13th International Conference on Frontiers of Information Technology …, 2015
222015
Forensic analysis of copy-move forgery in digital images using the stationary wavelets
T Mahmood, T Nawaz, Z Mehmood, Z Khan, M Shah, R Ashraf
2016 Sixth International Conference on Innovative Computing Technology …, 2016
192016
Machine learning-based detection and classification of walnut fungi diseases
MA Khan, M Ali, M Shah, T Mahmood, M Ahmad, NZ Jhanjhi, ...
Intelligent Automation & Soft Computing 30 (3), 771-785, 2021
182021
Implementation of secure AODV in MANET
R Akhtar, NU Amin, I Memon, M Shah
International Conference on Graphic and Image Processing (ICGIP 2012) 8768, 6-10, 2013
162013
Watermarking-based secure plaintext image protocols for storage, show, deletion and retrieval in the cloud
X Dong, W Zhang, M Shah, B Wang, N Yu
IEEE Transactions on Services Computing 15 (3), 1678-1692, 2020
142020
Copy-move forgery detection technique based on DWT and Hu Moments
HAH Toqeer Mahmood, Tabassam Nawaz, Mohsin Shah, Zakir Khan, Rehan Ashraf
International Journal of Computer Science and Information Security (IJCSIS …, 2016
142016
A passive technique for detecting copy-move forgeries by image feature matching
MA Toqeer Mahmood, Mohsin Shah, Junaid Rashid, Muhammad Wasif Nisar
Multimedia Tools and Applications, 1-24, 2020
12*2020
Paillier cryptosystem based mean value computation for encrypted domain image processing operations
NY Mohsin Shah, Weiming Zhang, Honggang Hu
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2019
102019
Cnn-based automatic helmet violation detection of motorcyclists for an intelligent transportation system
T Waris, M Asif, MB Ahmad, T Mahmood, S Zafar, M Shah, A Ayaz
Mathematical Problems in Engineering 2022, 2022
92022
Survey on sentiment analysis of user reviews
S Naseem, T Mahmood, M Asif, J Rashid, M Umair, M Shah
2021 international conference on innovative computing (ICIC), 1-6, 2021
82021
LSB steganography using bits complementation
Z Khan, M Shah, M Naeem, D Shahzad, T Mahmood
International Conference on Chemical Engineering and Advanced Computational …, 2014
82014
Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem
NY Mohsin Shah, Weiming Zhang, Honggang Hu, Xiaojuan Dong
IET Image Processing 13 (10), 1705--1713, 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20