Publications

Indexed Publication

List of Publications and cited by data for this application is Scopus and extracted from http://scival-expert.utm.my with 11 publications and H-Index is 3

Authors,Title,Publication,Volume,Number,Pages,Year,Publisher

  1. Sasan Karamizadeh; Shahidan M Abdullah; Mazdak Zamani; Atabak Kherikhah,Pattern recognition techniques: Studies on appropriate classifications, Lecture Notes in Electrical Engineering. 2015;315:791-799.
  2. Sasan Karamizadeh; Shahidan M. Abdullah; Mazdak Zamani; Atabak Kherikhah, Pattern recognition techniques: Studies on appropriate classifications ARPN Journal of Engineering and Applied Sciences. 2014;9(8):1215-1219.
  3. Boroujerdizadeh; A.R. Ghobadi; A.H. Yaribakht; M. Shahidan Bin Abdoullah A novel method to reduce collusion attack possibility on watermarking, International Conference on Advanced Communication Technology, ICACT. 2013:1066-1071.
  4. Amirmohammad Sadeghian; Mazdak Zamani; Shahidan M. Abdullah A taxonomy of SQL injection attacks, Proceedings – 2013 International Conference on Informatics and Creative Multimedia, ICICM 2013. 2013:269-273.
  5. Mazdak Zamani; Azizah Bt Abdul Manaf; Shahidan M. Abdullah An overview on audio steganography techniques, International Journal of Digital Content Technology and its Applications. 2012;6(13):107-122.
  6. Mazdak Zamani; Bt Abdul Manaf Azizah; M. Abdullah Shahidan; Chaeikar Saman Shojae Mazdak technique for PSNR estimation in audio steganography, Applied Mechanics and Materials. 2012;229-231:2798-2803.
  7. Mohammad Reza Abbasy; Azizah Abdul Manaf; M.A. Shahidan Data hiding method based on DNA basic characteristics, Communications in Computer and Information Science. 2011;194 CCIS:53-62.
  8. Abduljabbar Shaamala; Shahidan M. Abdullah; Azizah A. Manaf The effect of DCT and DWT domains on the robustness of genetic watermarking, Communications in Computer and Information Science. 2011;251 CCIS(PART 1):310-318.
  9. Maryam Gharooni; Mazdak Zamani; Mehdi Mansourizadeh; Shahidan Abdullah A confidential RFID model to prevent unauthorized access, 2011 5th International Conference on Application of Information and Communication Technologies, AICT 2011.  2011:[6110985].
  10. Shahidan M. Abdullah; Azizah A. Manaf Multiple layer reversible images watermarking using enhancement of difference expansion techniques, Communications in Computer and Information Science. 2010;87 CCIS(PART 1):333-342.
  11. Shahidan M. Abdullah; Azizah A. Manaf; Mazdak Zamani Capacity and quality improvement in reversible image watermarking approach, Proceeding – 6th International Conference on Networked Computing and Advanced Information Management, NCM 2010.  2010:81-85:[5572351].

 

Non-index Indexed Publication through Google scholar Publication

Authors,Title,Publication,Volume,Number,Pages,Year,Publisher

 

  1. “Zamani, Mazdak; Abdul Manaf, Azizah; Ahmad, Rabiah; MZM Khedher, Akram; Abdullah, Shahidan; “,A genetic-algorithm-based approach for audio steganography,”World Academy of Science, Engineering and Technology”,54,,360-363,2009,”World Academy of Science, Engineering and Technology (WASET)”
  2. “Abdullah, Shahidan M; Manaf, Azizah A; Zamani, Mazdak; “,Capacity and quality improvement in reversible image watermarking approach,”Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on”,,,81-85,2010,IEEE
  3. “Shaamala, Abduljabbar; Abdullah, Shahidan M; Manaf, Azizah A; “,Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking,IJCSI International Journal of Computer Science Issues,8,5,,2011,
  4. “Gharooni, Maryam; Zamani, Mazdak; Mansourizadeh, Mehdi; Abdullah, S; “,A confidential RFID model to prevent unauthorized access,”Application of Information and Communication Technologies (AICT), 2011 5th International Conference on”,,,1-5,2011,IEEE
  5. “Zamani, Mazdak; Manaf, Azizah Bt Abdul; Abdullah, Shahidan M; “,Efficient Embedding for Audio Steganography,”2nd International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics, April”,,,2-4,2012,
  6. “Zamani, Mazdak; Manaf, Azizah Bt Abdul; Abdullah, Shahidan M; “,Correlation between PSNR and size ratio in audio steganography,”11th International Conference on Telecommunications and Informatics, France, April”,,,2-4,2012,
  7. “Zamani, Mazdak; Manaf, Azizah Bt Abdul; Abdullah, Shahidan M; Chaeikar, Saman Shojae; “,Correlation between PSNR and bit per sample rate in audio steganography,”11th International Conference on Signal Processing, Saint Malo, Mont Saint-Michel, France, April”,,,2-4,2012,
  8. “Abdullah, Shahidan M; Manaf, Azizah A; “,Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques,Networked Digital Technologies,,,333-342,2010,Springer Berlin Heidelberg
  9. “Zeki, Akram M; Ibrahim, Adamu A; Manaf, Azizah A; Abdullah, Shahidan M; “,Comparative study of different steganographic techniques,Proceedings of the 11th WSEAS international conference on Applied computer science,,,48-52,2011,World Scientific and Engineering Academy and Society (WSEAS)
  10. “Shaamala, Abduljabbar; Abdullah, Shahidan M; Manaf, Azizah A; “,The Effect of DCT and DWT Domains on the Robustness of Genetic Watermarking,Informatics Engineering and Information Science,,,310-318,2011,Springer Berlin Heidelberg
  11. “Abdullah, Shahidan M; Manaf, Azizah A; Zamani, Mazdak; “,Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques,Journal of Information Security Research,1,2,64-70,2010,
  12. “Zamani, Mazdak; Abdul Manaf, Azizah; Abdullah, Mohd; “,An overview on audio steganography techniques,International Journal of Digital Content Technology and Its Applications,6,13,107-122,2012,Advanced Institute of Convergence Information Technology
  13. “Araghi, Tanya Koohpayeh; Zamani, Mazdak; Manaf, Azizah Bt Abdul; Abdullah, Shahidan M; Bojnord, Hoda Soltanian; Araghi, Sagheb Kohpayeh; “,A Survey for Prevention of Black Hole Attacks in Wireless Mobile Adhoc Networks Using IDS Agents,”12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS’13). Kuala Lumpur, Malaysia”,,,,2013,
  14. “Araghi, Tanya Koohpayeh; Zamani, Mazdak; Manaf, Azizah Bt Abdul; Abdullah, Shahidan M; Lyastani, Sanam Ghorbani; Araghi, Sagheb Kohpayeh; “,A Survey for Prevention of Black Hole Attacks in Wireless Mobile AdHoc Networks Using Cryptographic Techniques,”12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS’13). Kuala Lumpur, Malaysia”,,,,2013,
  15. “Araghi, Tanya Koohpayeh; Zamani, Mazdak; Manaf, Azizah Bt Abdul; Abdullah, Shahidan M; Bojnord, Hoda Soltanian; Araghi, Sagheb Kohpayeh; “,A Secure Model for Prevention of Black Hole Attack in Wireless Mobile Ad Hoc Networks,12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS’13). Malaysia,,,,2013,
  16. “Karamizadeh, Sasan; Abdullah, Shahidan M; Zamani, Mazdak; “,An Overview of Holistic Face Recognition,IJRCCT,2,9,738-741,2013,
  17. “ABDULLAH, MOHD SHAHIDAN BIN; “,Multilayer reversible watermarking using non-underflow difference expansion,,,,,2012,Universiti Teknologi Malaysia
  18. “Abdullah, Mohd Shahidan; Manaf, Azizah Abd; “,An Overview of Video Watermarking Techniques,,,,,2007,Citeseer
  19. “Mazdak, Zamani; Azizah, Bt Abdul Manaf; Shahidan, M Abdullah; Saman, Shojae Chaeikar; “,Mazdak technique for PSNR estimation in audio steganography,Applied Mechanics and Materials,229,,2798-2803,2012,
  20. “Abbasy, Mohammad Reza; Manaf, Azizah Abdul; Shahidan, MA; “,Data hiding method based on DNA basic characteristics,Digital Enterprise and Information Systems,,,53-62,2011,Springer Berlin Heidelberg
  21. “Abdullah, Mohd Shahidan; “,Prestasi Kaedah Penilaian Pertanyaan Dalam Pangkalan Data Teragih,,,,,1997,Universiti Pertanian Malaysia
  22. “Zamani, Mazdak; Abdul Manaf, Azizah; Ahmad, Rabiah; “,Genetic algorithm as an approach to resolve the problems of substitution techniques of audio steganography,,,,,2009,
  23. “A. Manaf, Azizah; M. Zeki, Akram; Jaafar, Sauythi; M. Abdullah, Shahidan; “,A Secure Digital Watermarking: An Overview,Malaysian Science And Technology Congress,,,,2006,
  24. “M. Zeki, Akram; A. Manaf, Azizah; Jaafar, Sauythi; M. Abdullah, Shahidan; “,Classification Of Digital Watermarking Attacks,Malaysia – Japan International Symposium on Advance Technology,,,,2007,
  25. “Karamizadeh, Sasan; Abdullah, Shahidan M; Manaf, Azizah A; Zamani, Mazdak; Hooman, Alireza; “,An Overview of Principal Component Analysis,Journal of Signal and Information Processing,4,,173,2013,Scientific Research Publishing
  26. “Sadeghian, Amirmohammad; Zamani, Mazdak; Abdullah, Shahidan M; “,A Taxonomy of SQL Injection Attacks,”Informatics and Creative Multimedia (ICICM), 2013 International Conference on”,,,269-273,2013,IEEE
  27. “Zainudin, M; Radi, H; Abdullah, S; Rahim, Rosman Abd; Ismail, M Muzafar; “,Face Recognition using Principle Component Analysis (PCA) and Linear Discriminant Analysis (LDA),ijens. org,,05,,2012,
  28. “Bakar, Abu; Rahim, Abd; Ouyang, Huajiang; Chiing Khaia, Lee; Abdullah, Mohd; “,Thermal analysis of a disc brake model considering a real brake pad surface and wear,International Journal of Vehicle Structures & Systems,2,1,20-27,2010,”MechAero Foundation for Technical Research and Education Excellence, MAFTREE”
  29. “Abdullah, Mohd; Zamani, Mazdak; “,An overview of holistic face recognition,International Journal of Research in Computer and Communication Technology,2,9,738-741,2013,
  30. “Karamizadeh, Sasan; Abdullah, Shahidan M; Zamani, Mazdak; Kherikhah, Atabak; “,Pattern Recognition Techniques: Studies on Appropriate Classifications,Advanced Computer and Communication Engineering Technology,,,791-799,2015,Springer International Publishing
  31. “Ghazizadeh, Eghbal; Shams Dolatabadi, ZS; Khaleghparast, Reza; Zamani, Mazdak; Manaf, Azizah Abd; Abdullah, Mohd Shahidan; “,Secure OpenID authentication model by using Trusted Computing,Abstract and Applied Analysis,2014,,,2014,Hindawi Publishing Corporation
  32. “Karamizadeh, Sasan; Abdullah, Shahidan M; Halimi, Mehran; Shayan, Jafar; javad Rajabi, Mohammad; “,Advantage and Drawback of Support Vector Machine Functionality
  33. “Ordi, Ali; Zamani, Mazdak; Idris, Norbik Bashah; Manaf, Azizah Abdul; Abdullah, Mohd Shahidan; “,A Novel WLAN Client Puzzle Against DoS Attack based on Pattern Matching