User profiles for Mohammad Sajid Mohammadi
![]() | Mohammad Sajid MohammadiDepartment of Computer Science,College of Engineering and Information Technology … Verified email at oc.edu.sa Cited by 157 |
[PDF][PDF] A comparative study of recent steganography techniques for multiple image formats
AS Ansari, MS Mohammadi… - International Journal of …, 2019 - researchgate.net
Steganography is the technique for exchanging concealed secret information in a way to
avoid suspicion. The aim of Steganography is to transfer secrete message to another party by …
avoid suspicion. The aim of Steganography is to transfer secrete message to another party by …
[Retracted] Improved Support Vector Machine and Image Processing Enabled Methodology for Detection and Classification of Grape Leaf Disease
…, M Ritonga, P Jamwal, MS Mohammadi… - Journal of Food …, 2022 - Wiley Online Library
In recent years, agricultural image processing research has been a key emphasis. Image
processing techniques are used by computers to analyze images. New advancements in …
processing techniques are used by computers to analyze images. New advancements in …
[Retracted] Detection of Pancreatic Cancer in CT Scan Images Using PSO SVM and Image Processing
AS Ansari, AS Zamani, MS Mohammadi… - BioMed Research …, 2022 - Wiley Online Library
A diagnosis of pancreatic cancer is one of the worst cancers that may be received anywhere
in the world; the five‐year survival rate is very less. The majority of cases of this condition …
in the world; the five‐year survival rate is very less. The majority of cases of this condition …
Soft computing techniques for detecting cyberbullying in social multimedia data
Cyberbullying is a form of abuse, manipulation, or humiliation directed against a single person
via the Internet. CB makes use of nasty Internet comments and remarks. It occurs when …
via the Internet. CB makes use of nasty Internet comments and remarks. It occurs when …
[PDF][PDF] JPEG Image Steganography based on Coefficients Selection and Partition
AS Ansari, MS Mohammadi… - International Journal of …, 2017 - academia.edu
Securing the communication tasks has become a prime concern in a world with almost 40%
of its population using the Internet [15]. For secure transmissions and communications over …
of its population using the Internet [15]. For secure transmissions and communications over …
[PDF][PDF] A Review of Image Steganography Based on Multiple Hashing Algorithm.
Steganography is a technique for hiding secret messages while sending and receiving
communications through a cover item. From ancient times to the present, the security of secret or …
communications through a cover item. From ancient times to the present, the security of secret or …
[PDF][PDF] Enhancing User Experience in AI-Powered Human-Computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method.
…, AS Ansari, MS Mohammadi - Computers, Materials & …, 2025 - researchgate.net
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or
display-driven control in human-computer communication (HCC). Specifically, the vocals contain …
display-driven control in human-computer communication (HCC). Specifically, the vocals contain …
[PDF][PDF] Digital colour image steganography for png format and secured based on encoding and clustering
A Ansari, MS Mohammadi… - International Journal of …, 2020 - researchgate.net
Security has become the top priority in any system of computers application, online systems
application etc. as millions of users are using Internet. This research paper proposes an …
application etc. as millions of users are using Internet. This research paper proposes an …
[PDF][PDF] An Animated GIF Steganography Using Variable Block Partition Scheme.
MAM Alyahya, AS Ansari, MS Mohammadi - Comput. Syst. Sci. Eng., 2022 - academia.edu
The paper presents a novel Graphics Interchange Format (GIF) Steganography system. The
algorithm uses an animated (GIF) file format video to apply on, a secured and variable …
algorithm uses an animated (GIF) file format video to apply on, a secured and variable …
[PDF][PDF] Design of Efficient Hashing Algorithm to Enhance Information/Network Security
MS Mohammadi, SS Ahmed, SK Khaiser - indusedu.org
In today’s Internet communication scenario to guarantee the security of data being
transmitted and to believe on the integrity and authenticity of data, the hash function play very …
transmitted and to believe on the integrity and authenticity of data, the hash function play very …