
default search action
Azizah Abdul Manaf
2020 – today
- 2023
- [j14]Nafees Mansoor
, Kaniz Fatema Antora, Priyata Deb, Tarek Ahammed Arman, Azizah Abdul Manaf
, Mahdi Zareei
:
A Review of Blockchain Approaches for KYC. IEEE Access 11: 121013-121042 (2023) - 2022
- [j13]Urmila Pilania, Rohit Tanwar
, Mazdak Zamani
, Azizah Abdul Manaf:
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression. Future Internet 14(9): 254 (2022) - 2021
- [c38]Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf:
A Conceptual Model to Identify Illegal Activities on the Bitcoin System. ACeS 2021: 18-34 - 2020
- [j12]Mehrbakhsh Nilashi
, Hossein Ahmadi, Azizah Abdul Manaf, Tarik A. Rashid
, Sarminah Samad, Leila Shahmoradi, Nahla Aljojo
, Elnaz Akbari:
Coronary Heart Disease Diagnosis Through Self-Organizing Map and Fuzzy Support Vector Machine with Incremental Updates. Int. J. Fuzzy Syst. 22(4): 1376-1388 (2020) - [c37]Omnia Abdullah Alharbi, Asia Othman Aljahdali, Azizah Abdul Manaf:
A Robust Double Layer Steganography Technique Based on DNA Sequences. ICFNDS 2020: 38:1-38:5 - [c36]AbdulAleem Al-Othmani, Azizah Abdul Manaf, Akram M. Zeki
, Qusay Al-Maatouk
, Abdulaziz Aborujilah, Maen T. Al-Rashdan:
Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech Signal. IMCOM 2020: 1-6
2010 – 2019
- 2019
- [j11]Mehrbakhsh Nilashi
, Sarminah Samad, Azizah Abdul Manaf, Hossein Ahmadi, Tarik A. Rashid
, Asmaa Munshi, Wafa Almukadi, Othman Ibrahim, Omed Hassan Ahmed:
Factors influencing medical tourism adoption in Malaysia: A DEMATEL-Fuzzy TOPSIS approach. Comput. Ind. Eng. 137 (2019) - [j10]Tanya Koohpayeh Araghi
, Azizah Abd Manaf:
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Future Gener. Comput. Syst. 101: 1223-1246 (2019) - 2018
- [j9]Tanya Koohpayeh Araghi
, Azizah Abd Manaf, Ala Abdulsalam Alarood
, Azida Binti Zainol
:
Host Feasibility Investigation to Improve Robustness in Hybrid DWT+SVD Based Image Watermarking Schemes. Adv. Multim. 2018: 1609378:1-1609378:9 (2018) - [j8]Tanya Koohpayeh Araghi
, Azizah Abd Manaf, Sagheb Kohpayeh Araghi:
A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst. Appl. 112: 208-228 (2018) - [j7]Saman Shojae Chaeikar
, Mazdak Zamani
, Azizah Bt Abdul Manaf, Akram M. Zeki
:
PSW statistical LSB image steganalysis. Multim. Tools Appl. 77(1): 805-835 (2018) - 2017
- [j6]Seyed Mojtaba Mousavi
, Alireza Naghsh
, Azizah A. Manaf, S. A. R. Abu-Bakar:
A robust medical image watermarking against salt and pepper noise for brain MRI images. Multim. Tools Appl. 76(7): 10313-10342 (2017) - [c35]Ali A. Elrowayati
, Mohammad Faiz Liew Abdullah
, Azizah Abd Manaf, Abdalrahman S. Alfagi:
Tampering detection of double-compression with the same quantization parameter in HEVC video streams. ICCSCE 2017: 174-179 - [c34]Sajjad Dadkhah
, Mario Köppen, Hamid Abdullah Jalab, Somayeh Sadeghi, Azizah Abdul Manaf, Diaa M. Uliyan
:
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics. ICPRAM 2017: 612-619 - [c33]Sajjad Dadkhah
, Mario Köppen, Somayeh Sadeghi, Kaori Yoshida, Hamid Abdullah Jalab, Azizah Abdul Manaf:
An efficient ward-based copy-move forgery detection method for digital image forensic. IVCNZ 2017: 1-6 - 2016
- [j5]Farnaz Arab
, Shahidan M. Abdullah, Siti Zaiton Mohd Hashim, Azizah Abdul Manaf, Mazdak Zamani
:
A robust video watermarking technique for the tamper detection of surveillance systems. Multim. Tools Appl. 75(18): 10855-10885 (2016) - 2015
- [j4]Farzad Kiani
, Ehsan Amiri
, Mazdak Zamani
, Touraj Khodadadi
, Azizah Abdul Manaf:
Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 618072:1-618072:13 (2015) - [j3]Mazdak Zamani
, Azizah Bt Abdul Manaf:
Genetic algorithm for fragile audio watermarking. Telecommun. Syst. 59(3): 291-304 (2015) - [c32]Nor Fatimah Bt. Awang
, Azizah Abd Manaf:
Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application. ICGS3 2015: 160-171 - [c31]Taniza Binti Tajuddin, Azizah Abd Manaf:
Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone. WorldCIS 2015: 132-138 - 2014
- [j2]Sajjad Dadkhah
, Azizah Abd Manaf, Yoshiaki Hori, Aboul Ella Hassanien, Somayeh Sadeghi:
An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process. Image Commun. 29(10): 1197-1210 (2014) - [c30]Mahdi Sharifi
, Azizah Abdul Manaf, Ali Memariani, Homa Movahednejad, Amir Vahid Dastjerdi:
Consensus-Based Service Selection Using Crowdsourcing Under Fuzzy Preferences of Users. IEEE SCC 2014: 17-26 - [c29]Mahdi Sharifi
, Azizah Abdul Manaf, Ali Memariani, Homa Movahednejad, Haslina Md Sarkan, Amir Vahid Dastjerdi:
Multi-criteria Consensus-Based Service Selection Using Crowdsourcing. AINA Workshops 2014: 114-120 - [c28]Ala Abdulhakim Alariki
, Azizah Abdul Manaf:
Investigation of Touch-Based User Authentication Features Using Android Smartphone. AMLTA 2014: 135-144 - [c27]Mohammed A. Saleh
, Azizah Abdul Manaf:
Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review. AMLTA 2014: 145-152 - [c26]Nor Fatimah Bt. Awang, Azizah Abdul Manaf, Wan Shafiuddin Zainudin:
A Survey on Conducting Vulnerability Assessment in Web-Based Application. AMLTA 2014: 459-471 - [c25]Iman Ahmeid Mohamed, Azizah Bt Abdul Manaf:
An enhancement of traceability model based-on scenario for digital forensic investigation process. CyberSec 2014: 12-15 - [c24]Sajjad Dadkhah
, Azizah Abd Manaf, Somayeh Sadeghi:
An Efficient Image Self-recovery and Tamper Detection Using Fragile Watermarking. ICIAR (1) 2014: 504-513 - [c23]Mohammed A. Saleh
, Azizah Abdul Manaf:
Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks. ISBAST 2014: 263-267 - [p2]Sajjad Dadkhah
, Azizah Abd Manaf, Somayeh Sadeghi:
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking. Bio-inspiring Cyber Security and Cloud Services 2014: 115-148 - [p1]Behzad Nazarbakhsh, Azizah Abd Manaf:
Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCA. Bio-inspiring Cyber Security and Cloud Services 2014: 383-422 - 2013
- [c22]Nor Fatimah Bt. Awang
, Azizah Abd Manaf:
Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing. SecNet 2013: 230-239 - 2012
- [c21]Somayeh Nikbakhsh, Azizah Bt Abdul Manaf, Mazdak Zamani
, Maziar Janbeglou:
A Novel Approach for Rogue Access Point Detection on the Client-Side. AINA Workshops 2012: 684-687 - [c20]Zuraidah Abdul Manaf
, Aliza Ismail, Noor Masliana Razlan, Rusni Daruis, Azizah Bt Abdul Manaf:
Initial Study of the Content Authentication on Digital Preservation of Cultural Institutions. AMLTA 2012: 509-515 - [c19]Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail
:
Development of Malaysian Digital Forensics Investigator Competency Identification Methods. AMLTA 2012: 554-565 - 2011
- [c18]Arash Habibi Lashkari
, Azizah Abdul Manaf, Maslin Masrom:
A Secure Recognition Based Graphical Password by Watermarking. CIT 2011: 164-170 - [c17]Mohammad Reza Abbasy, Azizah Abdul Manaf, Shahidan M. Abdullah:
Data Hiding Method Based on DNA Basic Characteristics. DEIS 2011: 53-62 - [c16]Arash Habibi Lashkari
, Azizah Abdul Manaf, Maslin Masrom, Salwani Mohd Daud
:
Security Evaluation for Graphical Password. DICTAP (1) 2011: 431-444 - [c15]Elfadil Sabeil, Azizah Bt Abdul Manaf, Zuraini Ismail
, Mohamed Abas
:
Trainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review. ICSECS (1) 2011: 517-526 - [c14]Akram M. Zeki
, Azizah A. Manaf, Shayma'a Senan Mahmod:
Improving the Robustness of ISB Watermarking Techniques by Repetition of the Embedding. ICSECS (1) 2011: 592-599 - [c13]Fatma Susilawati Mohamad, Azizah Abdul Manaf, Suriayati Chuprat:
The Use of Elimination Method and Nearest Neighbor for Oil Palm Fruit Ripeness Indicator. ICSECS (1) 2011: 674-686 - [c12]Mahdi Sharifi
, Azizah Abdul Manaf, Homa Movahednejad, Haslina Md Sarkan, Sayed Gholam Hassan Tabatabaei:
A taxonomy of trust oriented approaches for services computing. iiWAS 2011: 353-358 - [c11]Akram M. Zeki
, Azizah A. Manaf, Shayma'a Senan Mahmod:
Analysis of ISB watermarking model: block based methods vs embedding repetition methods. MoMM 2011: 198-201 - [c10]Fatma Susilawati Mohamad
, Azizah Abdul Manaf, S. Chuprat:
Nearest Neighbor For Histogram-based Feature Extraction. ICCS 2011: 1296-1305 - 2010
- [c9]Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo:
Genetic Audio Watermarking. BAIP 2010: 514-517 - [c8]Shahidan M. Abdullah, Azizah A. Manaf, Mazdak Zamani:
Capacity and quality improvement in reversible image watermarking approach. NCM 2010: 81-85 - [c7]Shahidan M. Abdullah
, Azizah A. Manaf:
Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques. NDT (1) 2010: 333-342 - [c6]Nurzaini Mohamad Zain, Ganthan Narayana Samy
, Rabiah Ahmad, Zuraini Ismail
, Azizah Bt Abdul Manaf:
Fuzzy Based Threat Analysis in Total Hospital Information System. AST/UCMA/ISA/ACN 2010: 1-14 - [i1]Hossein Rouhani Zeidanloo, Azizah Bt Abdul Manaf:
Botnet Detection by Monitoring Similar Communication Patterns. CoRR abs/1004.1232 (2010)
2000 – 2009
- 2009
- [c5]Mazdak Zamani
, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki
, Pritheega Magalingam
:
A Novel Approach for Audio Watermarking. IAS 2009: 83-86 - [c4]Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki, Shahidan M. Abdullah:
Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography. GEM 2009: 170-175 - [c3]Pritheega Magalingam
, Azizah Bt Abdul Manaf, Rabiah Ahmad, Zuraimi Yahya:
Digital Evidence Retrieval and Forensic Analysis on Gambling Machine. ICDF2C 2009: 111-121 - [c2]Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost, Akram M. Zeki
:
A secure audio steganography approach. ICITST 2009: 1-6 - 2008
- [j1]Abbas Cheddad
, Dzulkifli Mohamad, Azizah Abd Manaf:
Exploiting Voronoi diagram properties in face segmentation and feature extraction. Pattern Recognit. 41(12): 3842-3859 (2008) - 2007
- [c1]Sayuthi Jaafar, Azizah A. Manaf, Akram M. Zeki
:
Steganography technique using modulus arithmetic. ISSPA 2007: 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
