Author of the publication

Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images.

, , , and . Symmetry, 8 (6): 41 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems., , , , , and . IEEE Access, (2021)Automated Analysis of Pakistani Websites' Compliance with GDPR and Pakistan Data Protection Act., , and . FIT, page 234-239. IEEE, (2021)Image steganography in spatial domain: A survey., , , , and . Signal Process. Image Commun., (2018)Pixel value differencing steganography techniques: Analysis and open challenge., , , , and . ICCE-TW, page 21-22. IEEE, (2015)A M-Service Implementation in Large Government Organisation: A Case Study on an M-app in Australia., and . ACIS, page 80. (2016)Introduction to the special section on recent advances in multimedia forensics for cyber security and data tampering (VSI-forens)., and . Comput. Electr. Eng., (2024)A Study on the Forensic Analysis of Airlines Applications on Android Operating System., and . DSC, page 1-9. IEEE, (2023)A Forensic Framework for Webmail Threat Detection Using Log Analysis., , and . SecITC, volume 13195 of Lecture Notes in Computer Science, page 57-69. Springer, (2021)Forensic analysis of web browsers lifecycle: A case study., , , , , and . J. Inf. Secur. Appl., (2024)Adding 'Social' to Commerce to Influence Purchasing Behaviour., and . HCI (23), volume 11588 of Lecture Notes in Computer Science, page 257-273. Springer, (2019)