Follow
zakir khan
Title
Cited by
Cited by
Year
An improved image steganography technique based on MSB using bit differencing
AU Islam, F Khalid, M Shah, Z Khan, T Mahmood, A Khan, U Ali, ...
2016 Sixth International Conference on Innovative Computing Technology …, 2016
622016
A survey on block based copy move image forgery detection techniques
T Mahmood, T Nawaz, R Ashraf, M Shah, Z Khan, A Irtaza, Z Mehmood
2015 International Conference on Emerging Technologies (ICET), 1-6, 2015
502015
Robust method for semantic segmentation of whole-slide blood cell microscopic images
M Shahzad, AI Umar, MA Khan, SH Shirazi, Z Khan, W Yousaf
Computational and mathematical methods in medicine 2020, 2020
442020
An efficient forensic technique for exposing region duplication forgery in digital images
T Mahmood, Z Mehmood, M Shah, Z Khan
Applied Intelligence 48 (7), 1791-1801, 2018
432018
Threshold-based Steganography: A Novel Technique for Improved Payload and SNR
Z Khan, M Shah, M Naeem, T Mahmood, SNA Khan, NU Amin, ...
Internation Arab Journal of information Technology 13 (4), 2015
282015
Effect of ionic liquid on thermo-physical properties of bamboo biomass
N Muhammad, Y Gao, MI Khan, Z Khan, A Rahim, F Iqbal, AS Khan, ...
Wood science and technology 49, 897-913, 2015
272015
A new symmetric key encryption algorithm using images as secret keys
M Islam, M Shah, Z Khan, T Mahmood, MJ Khan
2015 13th International Conference on Frontiers of Information Technology …, 2015
222015
Forensic analysis of copy-move forgery in digital images using the stationary wavelets
T Mahmood, T Nawaz, Z Mehmood, Z Khan, M Shah, R Ashraf
2016 Sixth International Conference on Innovative Computing Technology …, 2016
192016
Image based analysis of meibomian gland dysfunction using conditional generative adversarial neural network
ZK Khan, AI Umar, SH Shirazi, A Rasheed, A Qadir, S Gul
BMJ Open Ophthalmology 6 (1), e000436, 2021
182021
Copy-move forgery detection technique based on DWT and Hu Moments
T Mahmood, T Nawaz, M Shah, Z Khan, R Ashraf, HA Habib
International Journal of Computer Science and Information Security (IJCSIS …, 2016
142016
A novel hybrid encryption scheme to ensure Hadoop based cloud data security
D Shehzad, Z Khan, H Dag, Z Bozkus
International Journal of Computer Science and Information Security (IJCSIS …, 2016
132016
Automatic eczema classification in clinical images based on hybrid deep neural network
A Rasheed, AI Umar, SH Shirazi, Z Khan, S Nawaz, M Shahzad
Computers in Biology and Medicine 147, 105807, 2022
112022
Identification of anemia and its severity level in a peripheral blood smear using 3-tier deep neural network
M Shahzad, AI Umar, SH Shirazi, Z Khan, A Khan, M Assam, A Mohamed, ...
Applied Sciences 12 (10), 5030, 2022
112022
Patch-CNN: Deep learning for logo detection and brand recognition
W Yousaf, A Umar, SH Shirazi, Z Khan, I Razzak, M Zaka
Journal of Intelligent & Fuzzy Systems 40 (3), 3849-3862, 2021
92021
LSB Steganography using Bits Complementation
K Zakir, S Mohsin, N Muhammad, S Danish, M Toqeer
International Conference on Chemical Engineering and Advanced Computational …, 2014
8*2014
Threshold based LSB audio steganography
A Hakeem, NU Amin, M Shah, Z Khan, A Qadi
Int’l Conf. on Chemical Engineering & Advanced Computational Technologies …, 2014
62014
Thermal gravimetric analysis of fiber glass
ZU Haq, AK Khattak, Z Khan, FU Khan, A Ather, SU Khan
Asian Journal of Research in Chemistry 9 (1), 22-24, 2016
52016
Performance improvement of threshold based audio steganography using parallel computation
M Shoaib, Z Khan, D Shehzad, T Dag, AI Umar, NU Amin
International Journal of Advanced Computer Science and Applications 7 (10), 2016
42016
An Enhanced Weight Based Clustering Algorithm for Mobile Adhoc Networks
D Shehzad, W Ishaq, Z Khan, J Iqbal
International conference on Computer Science and Information Systems (ICSIS …, 2014
42014
Two new antioxidant anthraquinones namely obtusifolate A and B from Rumex obtusifolius
A Khabir, F Khan, ZU Haq, Z Khan, S Khan, S Khan
Int J Biosci 10, 49-57, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20