Azizah Abdul Manaf
Orcid: 0000-0001-7792-2407Affiliations:
- Universiti Teknologi Malaysia
According to our database1,
Azizah Abdul Manaf
authored at least 55 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
2022
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression.
Future Internet, 2022
2021
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
2020
Coronary Heart Disease Diagnosis Through Self-Organizing Map and Fuzzy Support Vector Machine with Incremental Updates.
Int. J. Fuzzy Syst., 2020
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020
2019
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD.
Future Gener. Comput. Syst., 2019
Factors influencing medical tourism adoption in Malaysia: A DEMATEL-Fuzzy TOPSIS approach.
Comput. Ind. Eng., 2019
2018
A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition.
Expert Syst. Appl., 2018
Host Feasibility Investigation to Improve Robustness in Hybrid DWT+SVD Based Image Watermarking Schemes.
Adv. Multim., 2018
2017
A robust medical image watermarking against salt and pepper noise for brain MRI images.
Multim. Tools Appl., 2017
An efficient ward-based copy-move forgery detection method for digital image forensic.
Proceedings of the 2017 International Conference on Image and Vision Computing New Zealand, 2017
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics.
Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, 2017
Tampering detection of double-compression with the same quantization parameter in HEVC video streams.
Proceedings of the 7th IEEE International Conference on Control System, 2017
2016
A robust video watermarking technique for the tamper detection of surveillance systems.
Multim. Tools Appl., 2016
2015
Int. J. Distributed Sens. Networks, 2015
Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone.
Proceedings of the 2015 World Congress on Internet Security, 2015
Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015
2014
Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCA.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014
An effective SVD-based image tampering detection and self-recovery using active watermarking.
Signal Process. Image Commun., 2014
Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the Image Analysis and Recognition - 11th International Conference, 2014
An enhancement of traceability model based-on scenario for digital forensic investigation process.
Proceedings of the Third International Conference on Cyber Security, 2014
Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2014
Proceedings of the Advanced Machine Learning Technologies and Applications, 2014
Proceedings of the Advanced Machine Learning Technologies and Applications, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Consensus-Based Service Selection Using Crowdsourcing Under Fuzzy Preferences of Users.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014
2013
Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing.
Proceedings of the Advances in Security of Information and Communication Networks, 2013
2012
Development of Malaysian Digital Forensics Investigator Competency Identification Methods.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012
Initial Study of the Content Authentication on Digital Preservation of Cultural Institutions.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Proceedings of the International Conference on Computational Science, 2011
Analysis of ISB watermarking model: block based methods vs embedding repetition methods.
Proceedings of the MoMM'2011, 2011
Proceedings of the iiWAS'2011, 2011
Improving the Robustness of ISB Watermarking Techniques by Repetition of the Embedding.
Proceedings of the Software Engineering and Computer Systems, 2011
The Use of Elimination Method and Nearest Neighbor for Oil Palm Fruit Ripeness Indicator.
Proceedings of the Software Engineering and Computer Systems, 2011
Trainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review.
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011
2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the Information Processing and Management, 2010
2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009
Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography.
Proceedings of the 2009 International Conference on Genetic and Evolutionary Methods, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Pattern Recognit., 2008
2007
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007