| Title | Citation | Year |
|---|---|---|
| Image steganography techniques: an overviewþ N Hamid, A Yahya, RB Ahmad, OM Al-Qershiþ International Journal of Computer Science and Security (IJCSS) 6 (3), 168-187, 2012þ | 292 | 2012 |
| A Comparison between using SIFT and SURF for characteristic region based image steganographyþ N Hamid, A Yahya, RB Ahmad, OM Al-Qershiþ International Journal of Computer Science Issues (IJCSI) 9 (3), 110, 2012þ | 40 | 2012 |
| Characteristic region based image steganography using speeded-up robust features techniqueþ N Hamid, A Yahya, RB Ahmad, O Al-Qershiþ 2012 International Conference on Future Communication Networks, 141-146, 2012þ | 35 | 2012 |
| Enhancing visual quality of spatial image steganography using SqueezeNet deep learning networkþ N Hamid, BS Sumait, BI Bakri, O Al-Qershiþ Multimedia Tools and Applications 80 (28), 36093-36109, 2021þ | 27 | 2021 |
| Steganography in image files: A surveyþ N Hamid, A Yahya, RB Ahmad, D Najim, L Kanaanþ Australian Journal of Basic and Applied Sciences 7 (1), 35-55, 2013þ | 21 | 2013 |
| Secured and robust information hiding schemeþ NH Abdul-Mahdi, A Yahya, RB Ahmad, OM Al-Qershiþ Procedia Engineering 53, 463-471, 2013þ | 16 | 2013 |
| An improved robust and secured image Steganographic schemeþ N Hamid, A Yahya, RB Ahmad, OM Al-Qershiþ International Journal of Electronics and Communication Engineering …, 2012þ | 10 | 2012 |
| Enhancing the robustness of digital image steganography using ECC and redundancyþ N Hamid, A Yahya, RB Ahmad, D Najim, L Kanaanþ WULFENIA Journal 20 (4), 153-169, 2013þ | 8 | 2013 |
| Osamah M,“Image Steganography Techniques: An Over-view”þ N Hamid, A Yahya, RB Ahmadþ International Journal of computer science and securi-ty 6 (3), 2012þ | 4 | 2012 |
| Image Steganography Techniques: An Overview,‖ in International Journal of Computer Science and Security (IJCSS)þ N Hamid, A Yahya, RB Ahmad, OM Al-Qershiþ Volume (6), 2012þ | 3 | 2012 |
| Secured and robust information hiding schemeþ AM Nagham Hamed, Y Abid, AQ Osamah Mþ Elsevier BV, 2013þ | 2013 | |
| Robust and Secured Data Hiding Schemes Using Digital Image Steganographyþ NH Abdul-Mahdiþ School of Computer and Communication Engineering, 2013þ | 2013 | |
| This item is protected by original copyrightþ NMSB Adzaliþ UNIVERSITI MALAYSIA PERLIS, 2013þ | 2013 | |
| Blind image Steganography scheme using speeded-up robust features techniqueþ H Nagham, Y Abid, M Osamahþ Universiti Malaysia Perlis (UniMAP), 2012þ | 2012 |