Azizah Abdul Manaf

Orcid: 0000-0001-7792-2407

Affiliations:
  • Universiti Teknologi Malaysia


According to our database1, Azizah Abdul Manaf authored at least 54 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Review of Blockchain Approaches for KYC.
IEEE Access, 2023

2022
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression.
Future Internet, 2022

2020
Coronary Heart Disease Diagnosis Through Self-Organizing Map and Fuzzy Support Vector Machine with Incremental Updates.
Int. J. Fuzzy Syst., 2020

Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech Signal.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

A Robust Double Layer Steganography Technique Based on DNA Sequences.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

2019
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD.
Future Gener. Comput. Syst., 2019

Factors influencing medical tourism adoption in Malaysia: A DEMATEL-Fuzzy TOPSIS approach.
Comput. Ind. Eng., 2019

2018
PSW statistical LSB image steganalysis.
Multim. Tools Appl., 2018

A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition.
Expert Syst. Appl., 2018

Host Feasibility Investigation to Improve Robustness in Hybrid DWT+SVD Based Image Watermarking Schemes.
Adv. Multim., 2018

2017
A robust medical image watermarking against salt and pepper noise for brain MRI images.
Multim. Tools Appl., 2017

An efficient ward-based copy-move forgery detection method for digital image forensic.
Proceedings of the 2017 International Conference on Image and Vision Computing New Zealand, 2017

Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics.
Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, 2017

Tampering detection of double-compression with the same quantization parameter in HEVC video streams.
Proceedings of the 7th IEEE International Conference on Control System, 2017

2016
A robust video watermarking technique for the tamper detection of surveillance systems.
Multim. Tools Appl., 2016

2015
Genetic algorithm for fragile audio watermarking.
Telecommun. Syst., 2015

Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone.
Proceedings of the 2015 World Congress on Internet Security, 2015

Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

2014
Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCA.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

An effective SVD-based image tampering detection and self-recovery using active watermarking.
Signal Process. Image Commun., 2014

Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

An Efficient Image Self-recovery and Tamper Detection Using Fragile Watermarking.
Proceedings of the Image Analysis and Recognition - 11th International Conference, 2014

An enhancement of traceability model based-on scenario for digital forensic investigation process.
Proceedings of the Third International Conference on Cyber Security, 2014

Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2014

A Survey on Conducting Vulnerability Assessment in Web-Based Application.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2014

Investigation of Touch-Based User Authentication Features Using Android Smartphone.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2014

Multi-criteria Consensus-Based Service Selection Using Crowdsourcing.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Consensus-Based Service Selection Using Crowdsourcing Under Fuzzy Preferences of Users.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

2012
Development of Malaysian Digital Forensics Investigator Competency Identification Methods.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

Initial Study of the Content Authentication on Digital Preservation of Cultural Institutions.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

A Novel Approach for Rogue Access Point Detection on the Client-Side.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Nearest Neighbor For Histogram-based Feature Extraction.
Proceedings of the International Conference on Computational Science, 2011

Analysis of ISB watermarking model: block based methods vs embedding repetition methods.
Proceedings of the MoMM'2011, 2011

A taxonomy of trust oriented approaches for services computing.
Proceedings of the iiWAS'2011, 2011

Improving the Robustness of ISB Watermarking Techniques by Repetition of the Embedding.
Proceedings of the Software Engineering and Computer Systems, 2011

The Use of Elimination Method and Nearest Neighbor for Oil Palm Fruit Ripeness Indicator.
Proceedings of the Software Engineering and Computer Systems, 2011

Trainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review.
Proceedings of the Software Engineering and Computer Systems, 2011

Security Evaluation for Graphical Password.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

Data Hiding Method Based on DNA Basic Characteristics.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

A Secure Recognition Based Graphical Password by Watermarking.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
Botnet Detection by Monitoring Similar Communication Patterns
CoRR, 2010

Fuzzy Based Threat Analysis in Total Hospital Information System.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Capacity and quality improvement in reversible image watermarking approach.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Genetic Audio Watermarking.
Proceedings of the Information Processing and Management, 2010

2009
A secure audio steganography approach.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Digital Evidence Retrieval and Forensic Analysis on Gambling Machine.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography.
Proceedings of the 2009 International Conference on Genetic and Evolutionary Methods, 2009

A Novel Approach for Audio Watermarking.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Exploiting Voronoi diagram properties in face segmentation and feature extraction.
Pattern Recognit., 2008

2007
Steganography technique using modulus arithmetic.
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007


  Loading...