The evaluation performance of letter-based technique on text steganography system R Din, R Bakar, S Utama, J Jasmis, SJ Elias Bulletin of Electrical Engineering and Informatics 8 (1), 291-297, 2019 | 17 | 2019 |
A review on football match outcome prediction using bayesian networks N Razali, A Mustapha, S Utama, R Din Journal of Physics: Conference Series 1020 (1), 012004, 2018 | 11 | 2018 |
Evaluation review on effectiveness and security performances of text steganography technique R Din, S Utama, A Mustapha Indonesian Journal of Electrical Engineering and Computer Science 11 (2 …, 2018 | 11 | 2018 |
Traid-bit embedding process on Arabic text steganography method R Din, RA Thabit, NI Udzir, S Utama Bulletin of Electrical Engineering and Informatics 10 (1), 493-500, 2021 | 9 | 2021 |
Performance Review of Feature-Based Method in Implementation Text Steganography Approach S Utama, R Din Journal of Advanced Research in Applied Sciences and Engineering Technology …, 2022 | 8 | 2022 |
Review on feature-based method performance in text steganography MH Muhammad, HS Hussain, R Din, H Samad, S Utama Bulletin of Electrical Engineering and Informatics 10 (1), 427-433, 2021 | 7 | 2021 |
An Antonym Substitution-based model on linguistic steganography method FZ Mansor, A Mustapha, R Din, A Abas, S Utama Indonesian Journal of Electrical Engineering and Computer Science 12 (1 …, 2018 | 6 | 2018 |
Evaluating the feature-based technique of text steganography based on capacity and time processing parameters R Din, S Utama, SH Hanizan, MM Hilal, MA Hanif, A Zulhazlin, GM Fazali Advanced Science Letters 24 (10), 7355-7359, 2018 | 6 | 2018 |
Factors Influencing The Intention of Businesses Actor To Adopt Online Applications: An Empirical Evidence In Indonesia D Afrizal, S Utama, H Hildawati, Y Yuhardi, S Sofyan Golden Ratio of Marketing and Applied Psychology of Business 3 (1), 66-75, 2023 | 5 | 2023 |
Critical review of verification and validation process in feature-based method steganography R Din, S Utama Int. Conf. E-Commerce, 15-19, 2017 | 5 | 2017 |
The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography R Din, S Utama Borneo International Journal eISSN 2636-9826 6 (3), 88-95, 2023 | 4 | 2023 |
A comparative review on data hiding schemes R Din, RS Sabri, A Mustapha, S Utama Indones. J. Electr. Eng. Comput. Sci 11 (2), 768-774, 2018 | 4 | 2018 |
The Performance Evaluation of Feature-Based Technique in Text Steganography S Utama, R Din, M Mahmuddin J. Eng. Sci. Technol 12, 169-180, 2017 | 4 | 2017 |
Analysis review of feature-based method in term of verification and validation performance R Din, S Utama Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018 | 3 | 2018 |
Critical analysis on steganography technique in text domain S Utama, R Din, M Mahmuddin | 3 | 2016 |
Evaluation review of effectiveness and security metrics performance on information technology domain R Din, R Bakar, A Ismail, A Mustapha, S Utama Indonesian Journal of Electrical Engineering and Computer Science 16 (2 …, 2019 | 2 | 2019 |
A comparative study of Text Steganography and Linguistic Steganography S Utama, R Din, M Mahmuddin | 1 | 2015 |
Application of the Canny Filter in Digital Steganography AJQ Almaliki, SM Abd, IA Lafta, R Din, O Ghazali, JQ Almaliki, S Utama Semarak International Journal of Applied Sciences and Engineering Technology …, 2024 | | 2024 |
Information Hiding in Image Using Amplitude Modulation Algorithm AJ Qasim, R Din, S Utama, SG Najeeb, JQ Almaliki Borneo International Journal eISSN 2636-9826 6 (4), 60-66, 2023 | | 2023 |
Exploring Effective Attack Strategies on Steganographic Systems AJ Qasim, R Din, S Utama, SG Najeeb, JQ Almaliki Borneo International Journal eISSN 2636-9826 6 (4), 67-78, 2023 | | 2023 |