Faculty Mehdi Hussain

Mehdi Hussain

HOD Department of Information Security (IS-DoC)
Summary

Dr. Mehdi Hussain earned his Ph.D. degree in Information Security from the University of Malaya, Malaysia, in 2017. Currently, he holds the position of Associate Professor, HoD Information Security and Co-Director of the WALEE-NUST Lab at the School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Pakistan. With over 17 years of research and teaching experience, he has developed various real-time products and libraries. He secured an HEC Overseas Scholarship for his Ph.D. and a partial scholarship for his MS from Streaming Networks Pvt. Pakistan. His areas of research are Multimedia Security, Multimedia Forensics, Image Steganography, Image Tamper Detection, Reversible Data Hiding, and Video/Image compression. Dr. Hussain is recognized as an IEEE Senior Member, an approved HEC PhD supervisor, and a guest editor and reviewer for prestigious journals. He has authored more than 35 publications in image steganography, network traffic analysis, and cybersecurity fields. His contributions to academia and industry can be explored further through his Google Scholar profile.

Academic Background
PhD (Steganography) Universiti Malaya September 01, 2014 - October 26, 2017
Honours and Awards
FDP
Publications
zk-DASTARK: A quantum-resistant, data authentication and zero-knowledge proof scheme for protecting data feed to smart contracts April 01, 2025 Computers & Electrical Engineering - Volume 123, Part B, Article Number 110089
Intelligent parameter-based in-network IDS for IoT using UNSW-NB15 and BoT-IoT datasets January 01, 2025 Journal of the Franklin Institute - Volume 362, Issue 1, Article Number 107440
Performance-Oriented and Sustainability-Oriented Design of an Effective Android Malware Detector October 24, 2024 IEEE Access - Volume: 12, Page(s):159036-159055
Generisch-Net: A Generic Deep Model for Analyzing Human Motion with Wearable Sensors in the Internet of Health Things September 24, 2024 MDPI Sensors - Volume 24(19), Article Number 6167
Forensic analysis of web browsers lifecycle: A case study September 01, 2024 Journal of Information Security and Applications - Volume 85 , Article Number 103839
Unveiling Fall Origins: Leveraging Wearable Sensors to Detect Pre-Impact Fall Causes August 01, 2024 IEEE Sensors Journal - Volume: 24, Issue: 15, Pages:24086-24095
Smart-Wearable Sensors and CNN-BiGRU Model: A Powerful Combination for Human Activity Recognition December 07, 2023 IEEE Sensors Journal - Volume: 24, Issue: 2, 15 January 2024
Hiding EPR and watermark in medical images using repeated pixel differencing October 16, 2023 Multimedia Tools and Applications - Pages 1-29
Machines Perceive Emotions: Identifying Affective States from Human Gait Using On-Body Smart Devices April 09, 2023 Applied Sciences - Volume 13, Issue 8, 4828
A portable hardware security module and cryptographic key generator November 01, 2022 Journal of Information Security and Applications - Volume 70, Article Number 103332
Permissions-Based Detection of Android Malware Using Machine Learning April 02, 2022 Symmetry - Volume 14(4), Article Number 718
A Forensic Analysis of Video Streaming Activities on Android Applications March 31, 2022 Mobile and Forensics - Volume 4, No.1, Pages 44-52
Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems October 22, 2021 IEEE Access - Volume 9, Pages 141273-141294
Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App August 24, 2021 Applied Sciences - Volume 11, Issue 17, Article Number 7789
PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS July 15, 2021 Electronics - Volume 10(14), Article Number 1691
Enhanced adaptive data hiding method using LSB and pixel value differencing March 06, 2021 Multimedia Tools and Applications - Pages 1-21
GAFOR: Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor Networks December 28, 2020 Mathematics - Volume 9(1), Article Number 43
Real-Time Automated Contour Based Motion Tracking Using a Single-Camera for Upper Limb Angular Motion Measurement January 31, 2020 Malaysian Journal of Computer Science - Volume 33(1), Pages 52-77
What Lies Beneath One’s Feet? Terrain Classification Using Inertial Data of Human Walk July 31, 2019 Applied Sciences - Vol. 9 Issue 15, p3099-3099
High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution November 09, 2018 Applied Sciences - NULL
Image Steganography in Spatial Domain: A Survey July 01, 2018 Signal Processing: Image Communication - Volume 65, Pages 46-66
Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE January 01, 2018 IETE Technical Review - Volume 35, Issue 1, Pages: 53-63
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement February 01, 2017 Signal Processing: Image Communication - Volume: 50 Pages: 44-57
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images June 01, 2016 Symmetry - Volume 8, Issue 6, Article number 41
Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review September 01, 2015 International Journal of Security and its Applications - Volume 9, Issue 9, Pages 225-234
Crime Mining: A Comprehensive Survey January 01, 2015 International Journal of u- and e- Service, Science and Technology - Volume 8, No.2, Pages 357-364
Challenges and Issues in DATA Stream: A Review January 01, 2015 International Journal of Hybrid Information Technology - Volume 8, No.3, Pages 155-164
Application of Data Mining Using Artificial Neural Network: Survey January 01, 2015 International Journal of Database Theory and Application - Volume 8, No.1, Pages 245-270
Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography January 01, 2015 International Journal of Security and Its Applications - Volume 9, No.2, Pages 179-188
Characterizing Strengths of Snort-based IDPS April 02, 2014 Research Journal of Recent Sciences - Volume 3(4), Pages 88-94
Information Hiding Using Edge Boundaries of Objects July 16, 2011 International Journal of Security and Its Applications - Volume 5, No. 3, Pages 1-10
Conferences
A Study on the Forensic Analysis of Airlines Applications on Android Operating System November 07, 2023 - November 09, 2023 Urva Maryam, Mehdi Hussain, 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023
A Forensic Framework for Webmail Threat Detection Using Log Analysis October 13, 2022 - October 13, 2022 Abdul Saboor Malik, Muhammad Khuram Shahzad, Mehdi Hussain, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Automated Analysis of Pakistani Websites’ Compliance with GDPR and Pakistan Data Protection Act December 13, 2021 - December 14, 2021 Muhammad Asif, Yousra Javed, Mehdi Hussain, 2021 International Conference on Frontiers of Information Technology (FIT)
Towards A Distributed Ledger Based Verifiable Trusted Protocol For VANET May 21, 2021 - May 22, 2021 Muhammad Usman Aftab, Mehdi Hussain , Anders Lindgren, Abdul Ghafoor, 2021 International Conference on Digital Futures and Transformative Technologies (ICoDT2)
Pixel value differencing steganography techniques: Analysis and open challenge June 06, 2015 - June 08, 2015 Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Nor Badrul Anuar, Rosli Salleh, Rafidah Md Noor, 2015 IEEE International Conference on Consumer Electronics - Taiwan
Pixel intensity based high capacity data embedding method June 14, 2010 - June 16, 2010 Mehdi Hussain, Mureed Hussain, 2010 International Conference on Information and Emerging Technologies, ICIET 2010
Principal Software Engineer Streaming Networks Pvt. April 03, 2006 - August 31, 2014