Mohsin Shah

Orcid: 0000-0003-2227-9797

According to our database1, Mohsin Shah authored at least 16 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Recognizing factors effecting the use of mobile banking apps through sentiment and thematic analysis on user reviews.
Neural Comput. Appl., September, 2023

2022
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud.
IEEE Trans. Serv. Comput., 2022

QoS-Aware Cost Minimization Strategy for AMI Applications in Smart Grid Using Cloud Computing.
Sensors, 2022

International comparisons of laboratory values from the 4CE collaborative to predict COVID-19 mortality.
npj Digit. Medicine, 2022

Correction to: A simple and effective sub-image separation method.
Multim. Tools Appl., 2022

A simple and effective sub-image separation method.
Multim. Tools Appl., 2022

2020
A passive technique for detecting copy-move forgeries by image feature matching.
Multim. Tools Appl., 2020

2019
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations.
ACM Trans. Multim. Comput. Commun. Appl., 2019

Data hiding technique in steganography for information security using number theory.
J. Inf. Sci., 2019

Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem.
IET Image Process., 2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret.
CoRR, 2019

2018
A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform.
J. Vis. Commun. Image Represent., 2018

An efficient forensic technique for exposing region duplication forgery in digital images.
Appl. Intell., 2018

2016
Threshold-based steganography: a novel technique for improved payload and SNR.
Int. Arab J. Inf. Technol., 2016

2015
A New Symmetric Key Encryption Algorithm Using Images as Secret Keys.
Proceedings of the 13th International Conference on Frontiers of Information Technology, 2015

2014
Intuitive weights of harm for therapeutic decision making in smear-negative pulmonary Tuberculosis: an interview study of physicians in India, Pakistan and Bangladesh.
BMC Medical Informatics Decis. Mak., 2014


  Loading...