Mohsin Shah
Mohsin Shah
Assistant Professor Department of Telecommunication Hazara University Mansehra Pakistan
Verified email at
Cited by
Cited by
A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform
TS Toqeer Mahmood , Zahid Mehmood , Mohsin Shah
Journal of Visual Communication and Image Representation 53, 202--214, 2018
Copy-move forgery detection technique for forensic analysis in digital images
T Mahmood, T Nawaz, A Irtaza, R Ashraf, M Shah, MT Mahmood
Mathematical Problems in Engineering 2016, 2016
A survey on block based copy move image forgery detection techniques
T Mahmood, T Nawaz, R Ashraf, M Shah, Z Khan, A Irtaza, Z Mehmood
2015 International Conference on Emerging Technologies (ICET), 1-6, 2015
An improved image steganography technique based on MSB using bit differencing
AU Islam, F Khalid, M Shah, Z Khan, T Mahmood, A Khan, U Ali, ...
2016 Sixth International Conference on Innovative Computing Technology …, 2016
An efficient forensic technique for exposing region duplication forgery in digital images
T Mahmood, Z Mehmood, M Shah, Z Khan
Applied Intelligence 48 (7), 1791-1801, 2018
Threshold-based steganography: a novel technique for improved payload and snr
DS Zakir Khan, Mohsin Shah, Muhammad Naeem, Toqeer Mahmood, Shah Khan, Noor ...
The International Arab Journal of Information Technology, 2016
Data hiding technique in Steganography for information security using number theory
AA Amjad Rehman, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah
Journal of Information Science 45 (6), 767--778, 2018
Implementation of secure AODV in MANET
R Akhtar, NU Amin, I Memon, M Shah
International Conference on Graphic and Image Processing (ICGIP 2012) 8768 …, 2013
Forensic analysis of copy-move forgery in digital images using the stationary wavelets
T Mahmood, T Nawaz, Z Mehmood, Z Khan, M Shah, R Ashraf
2016 Sixth International Conference on Innovative Computing Technology …, 2016
A new symmetric key encryption algorithm using images as secret keys
M Islam, M Shah, Z Khan, T Mahmood, MJ Khan
2015 13th International Conference on Frontiers of Information Technology …, 2015
Homomorphic Encryption-Based Reversible Data Hiding for 3D Mesh Models
Arabian Journal for Science and Engineering 43 (12), 8145--8157, 2018
Copy-move forgery detection technique based on DWT and Hu Moments
HAH Toqeer Mahmood, Tabassam Nawaz, Mohsin Shah, Zakir Khan, Rehan Ashraf
International Journal of Computer Science and Information Security (IJCSIS …, 2016
LSB steganography using bits complementation
Z Khan, M Shah, M Naeem, D Shahzad, T Mahmood
International Conference on Chemical Engineering and Advanced Computational …, 2014
Threshold based LSB audio steganography
A Hakeem, NU Amin, M Shah, Z Khan, A Qadi
Int’l Conf. on Chemical Engineering & Advanced Computational Technologies, 88-92, 2014
Design of Low Dispersion Photonic Crystal Fiber Using Smoothing Filter Coefficients
MU Tayyab, M Shah, T Mahmood, Z Khan
Journal of Basic and Applied Scientific Research, 2090-4304, 2014
A passive technique for detecting copy-move forgeries by image feature matching
MA Toqeer Mahmood, Mohsin Shah, Junaid Rashid, Muhammad Wasif Nisar
Multimedia Tools and Applications, 1-24, 2020
A restrained paillier cryptosystem and its applications for access control of common secret
X Dong, W Zhang, M Shah, B Wang, N Yu
arXiv preprint arXiv:1912.09034, 2019
Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem
NY Mohsin Shah, Weiming Zhang, Honggang Hu, Xiaojuan Dong
IET Image Processing 13 (10), 1705--1713, 2019
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud
X Dong, W Zhang, M Shah, B Wang, N Yu
IEEE Transactions on Services Computing, 2020
中国科学技术大学基于 Paillier 密码体制的可逆信息隐藏及其在密文域的扩展应用
M Shah
中国科学技术大学, 2019
The system can't perform the operation now. Try again later.
Articles 1–20