Mehdi Hussain

Orcid: 0000-0003-4321-2532

According to our database1, Mehdi Hussain authored at least 21 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Generisch-Net: A Generic Deep Model for Analyzing Human Motion with Wearable Sensors in the Internet of Health Things.
Sensors, October, 2024

Hiding EPR and watermark in medical images using repeated pixel differencing.
Multim. Tools Appl., May, 2024

Forensic analysis of web browsers lifecycle: A case study.
J. Inf. Secur. Appl., 2024

Introduction to the special section on recent advances in multimedia forensics for cyber security and data tampering (VSI-forens).
Comput. Electr. Eng., 2024

Performance-Oriented and Sustainability-Oriented Design of an Effective Android Malware Detector.
IEEE Access, 2024

2023
Correction to: Enhanced adaptive data hiding method using LSB and pixel value differencing.
Multim. Tools Appl., September, 2023

A Study on the Forensic Analysis of Airlines Applications on Android Operating System.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
Permissions-Based Detection of Android Malware Using Machine Learning.
Symmetry, 2022

A portable hardware security module and cryptographic key generator.
J. Inf. Secur. Appl., 2022

2021
Enhanced adaptive data hiding method using LSB and pixel value differencing.
Multim. Tools Appl., 2021

Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems.
IEEE Access, 2021

A Forensic Framework for Webmail Threat Detection Using Log Analysis.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

Automated Analysis of Pakistani Websites' Compliance with GDPR and Pakistan Data Protection Act.
Proceedings of the International Conference on Frontiers of Information Technology, 2021

2018
Image steganography in spatial domain: A survey.
Signal Process. Image Commun., 2018

2017
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement.
Signal Process. Image Commun., 2017

2016
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images.
Symmetry, 2016

Current Landscape and Potential of Mobile Computing Research in the Least Developed Countries.
Electron. J. Inf. Syst. Dev. Ctries., 2016

A M-Service Implementation in Large Government Organisation: A Case Study on an M-app in Australia.
Proceedings of the Australasian Conference on Information Systems, 2016

2015
Effects of Organizational Culture on M-Government Adoption: A Case Study on E-Purjee in Bangladesh.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Pixel value differencing steganography techniques: Analysis and open challenge.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
mGovernment Services and Adoption: Current Research and Future Direction.
Proceedings of the Creating Value for All Through IT, 2014


  Loading...