Dr. Mohsin Shah
Biography
Designation :
Assistant Professor
Email Address :
syedmohsinshah@hu.edu.pk
Contact Number:
Mohsin Shah received B.Sc Telecommunication Engineering from the University of Engineering and Technology (UET) Peshawar Pakistan in 2007 and M.Sc Telecommunication Engineering from the University of Engineering and Technology (UET) Taxila Pakistan in 2012. Currently, he is working toward his Ph.D. degree as a CAS-TWAS President Fellow at CAS Key Laboratory of Electromagnetic Space Information, University of Science and Technology of China. His research interests include information hiding, secure signal processing and image forgery detection.
Academic Background
| S.No | Degree Title | Institute | Degree Completion Year |
|---|---|---|---|
| 1 | PhD in Information Security | University of Science and Technology of China | 2019 |
| 2 | M.Sc Telecommunication Engineering | University of Engineering and Technology Taxila Pakistan | 2012 |
| 3 | B.Sc Telecommunication Engineering | University of Engineering and Technology Peshawar Pakistan | 2007 |
| 4 | Post doctorate | Department of Computer Engineering, Gachon University, Republic of Korea | 2025 |
Publications
| S.No | Publication Title | Authors | Action |
|---|---|---|---|
| 1 | Paillier cryptosystem based mean value computation for encrypted domain image processing operations | Mohsin Shah, Weiming Zhang, Honggang Hu, and Nenghai Yu | Click to View |
| 2 | Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem | Mohsin Shah, Weiming Zhang, Honggang Hu, Xiaojuan Dong, and Nenghai Yu | Click to View |
| 3 | Homomorphic encryption-based reversible data hiding for 3d mesh models | Mohsin Shah, Weiming Zhang, Honggang Hu, Hang Zhou, and Toqeer Mahmood | Click to View |
| 4 | Watermarking- based secure plaintext image protocols for storage, show, deletion and retrieval in the cloud | Dong Xiaojuan, Weiming Zhang, Mohsin Shah, and Nenghai Yu | Click to View |
| 5 | A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform | Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, and Tanzila Saba | Click to View |
| 6 | Adaptive Scheduling in Cognitive IoT Sensors for Optimizing Network Performance Using Reinforcement Learning | Muhammad Nawaz Khan, Sokjoon Lee, and Mohsin Shah | Click to View |
| 7 | Adaptive Scheduling in Cognitive IoT Sensors for Optimizing Network Performance Using Reinforcement Learning | Muhammad Nawaz Khan, Sokjoon Lee, and Mohsin Shah | Click to View |
| 8 | Towards a data centric framework for 5g and beyond echosystems | Muhamamd Asad Khan, Mohsin Shah, and Waqar Ishaq | Click to View |
| 9 | Frequency domain manipulation of multiple copy-move forgery in digital image forensics | Tanzeela Qazi, Mohsin Shah, Mushtaq Ali, Faqir Gul, Muneer Ahmad, and Ajmal Khan | Click to View |
| 10 | An Effective Adaptive Downsampling Method for High-Resolution Multi-Panel Image Segmentation | Faqir Gul; Mohsin Shah; Mushtaq Ali; Tanzeela Qazi; Muneer Ahmad; Abid Mehmood | Click to View |
| 11 | A hybrid multi-panel image segmentation framework for improved medical image retrieval system | Faqir Gul,Mohsin Shah ,Mushtaq Ali,Lal Hussain ,Touseef Sadiq ,Adeel Ahmed Abbasi,Mohammad Shahbaz Khan,Badr S. Alkahtani | Click to View |
| 12 | Recognizing factors effecting the use of mobile banking apps through sentiment and thematic analysis on user reviews | Toqeer Mahmood, Saba Naseem Rehan Ahsraf, Muhamamd Asif, Muhammad Umair, and Mohsin Shah | Click to View |
| 13 | CNN-Based Automatic Helmet Violation Detection of Motorcyclists for an Intelligent Transportation System | Tasbeeha Waris, Muhammad Asif, Maaz Bin Ahmad, Toqeer Mahmood, Sadia Zafar, and Mohsin Shah and Ahsan Ayaz | Click to View |
| 14 | Improved Multi-Model Classification Technique for Sound Event Detection in Urban Environments | Muhammad Salman Khan, Mohsin Shah, Asfandyar Khan, Amjad Aldweesh, Mushtaq Ali, Elsayed Tag eldin, Waqar Ishaq, and Lal Hussain | Click to View |
| 15 | Diverse Pose Lip-Reading Framework | Naheed Akhtar, Mushtaq Ali, Lal Hussain, Mohsin Shah, Toqeer Mahmood, Amjad Ali, and Ala Al-Fuqaha | Click to View |
| 16 | QoS-Aware Cost Minimization Strategy for AMI Applications in Smart Grid Using Cloud Computing | Asfandyar Khan, Arif Iqbal Umar, Syed Hamad Shirazi, Waqar Ishaq, Mohsin Shah, Muhammad Assam, and Abdullah Mohamed | Click to View |
| 17 | Machine Learning-based Detection and Classification of Walnut Fungi Diseases | Muhammad Alyas Khan, Mushtaq Ali, Mohsin Shah, Toqeer Mahmood, Muneer Ahmad, NZ Jhanjhi, Mohammad Arif Sobhan Bhuiyan, Emad Sami Jaha | Click to View |
| 18 | A simple and effective sub-image separation method | Mushtaq Ali, Muhammad Zubair Asghar, Mohsin Shah | Click to View |
| 19 | A passive technique for detecting copy-move forgeries by image feature matching | Toqeer Mahmood, Mohsin Shah, Junaid Rashid, Muhammad Wasif Nisar, and Muhammad Asif | Click to View |
| 20 | Data hiding technique in steganography for information security using number theory | Amjad Rehman, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, and Adeel Anjum | Click to View |
| 21 | Data hiding technique in steganography for information security using number theory | Amjad Rehman, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, and Adeel Anjum | Click to View |
| 22 | An efficient forensic technique for exposing region duplication forgery in digital images | Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, and Zakir Khan | Click to View |
| 23 | Copy-move forgery detection technique for forensic analysis in digital images | Toqeer Mahmood, Tabassam Nawaz, Aun Irtaza, Rehan Ashraf, Mohsin Shah, and Muhammad Tariq Mahmood | Click to View |