1. Face spoof attack recognition using discriminative image patches;Akhtar;J. Electr. Comput. Eng.,2016
2. Remodeling of elliptic curve cryptography scalar multiplication architecture using parallel jacobian coordinate system;Gutub;Int. J. Comput. Sci. Secur.,2010
3. Secure surveillance framework for IoT systems using probabilistic image encryption;Muhammad;IEEE Trans. Ind. Inf.,2018
4. S.M. Al-Nofaie, M.M. Fattani, and A.A.-A. Gutub, “Merging two steganography techniques adjusted to improve arabic text data security.”
5. Pixel indicator technique for RGB image steganography;Gutub;J. Emerg. Technol. Web Intell.,2010