Mehdi Hussain

1.6k total citations · 1 hit paper
46 papers, 916 citations indexed

About

Mehdi Hussain is a scholar working on Computer Vision and Pattern Recognition, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Mehdi Hussain has authored 46 papers receiving a total of 916 indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Computer Vision and Pattern Recognition, 13 papers in Computer Networks and Communications and 12 papers in Information Systems. Recurrent topics in Mehdi Hussain's work include Advanced Steganography and Watermarking Techniques (13 papers), Chaos-based Image/Signal Encryption (12 papers) and Digital Media Forensic Detection (12 papers). Mehdi Hussain is often cited by papers focused on Advanced Steganography and Watermarking Techniques (13 papers), Chaos-based Image/Signal Encryption (12 papers) and Digital Media Forensic Detection (12 papers). Mehdi Hussain collaborates with scholars based in Pakistan, Malaysia and South Korea. Mehdi Hussain's co-authors include Ki‐Hyun Jung, Ainuddin Wahid Abdul Wahab, Anthony T. S. Ho, Qaiser Riaz, Ali Bhutto, Shaheed Zulfiqar, Eric J. Lien, Mohd Yamani Idna Idris, Shahzad Saleem and Muhammad Shahzad and has published in prestigious journals such as Journal of Medicinal Chemistry, IEEE Access and Sensors.

In The Last Decade

Mehdi Hussain

38 papers receiving 835 citations

Hit Papers

Image steganography in sp... 2018 2026 2020 2023 2018 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Mehdi Hussain Pakistan 16 721 138 110 92 75 46 916
Gandharba Swain India 24 1.3k 1.8× 113 0.8× 34 0.3× 39 0.4× 59 0.8× 73 1.4k
Chunfang Yang China 19 1.1k 1.5× 196 1.4× 75 0.7× 42 0.5× 54 0.7× 94 1.2k
Chwei‐Shyong Tsai Taiwan 19 1.1k 1.6× 226 1.6× 117 1.1× 174 1.9× 223 3.0× 45 1.4k
Leif Uhsadel Belgium 7 196 0.3× 361 2.6× 72 0.7× 130 1.4× 106 1.4× 9 474
Dongming Zhang China 11 303 0.4× 131 0.9× 77 0.7× 21 0.2× 29 0.4× 65 457
Gaël Rouvroy Belgium 11 370 0.5× 336 2.4× 144 1.3× 41 0.4× 31 0.4× 32 514
Enrique Cantó Spain 12 170 0.2× 89 0.6× 206 1.9× 39 0.4× 87 1.2× 45 353
P. Chenna Reddy India 11 213 0.3× 86 0.6× 28 0.3× 195 2.1× 50 0.7× 76 514
Vojtěch Holub United States 12 3.0k 4.1× 363 2.6× 125 1.1× 17 0.2× 47 0.6× 12 3.0k

Countries citing papers authored by Mehdi Hussain

Since Specialization
Citations

This map shows the geographic impact of Mehdi Hussain's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mehdi Hussain with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mehdi Hussain more than expected).

Fields of papers citing papers by Mehdi Hussain

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mehdi Hussain. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mehdi Hussain. The network helps show where Mehdi Hussain may publish in the future.

Co-authorship network of co-authors of Mehdi Hussain

This figure shows the co-authorship network connecting the top 25 collaborators of Mehdi Hussain. A scholar is included among the top collaborators of Mehdi Hussain based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mehdi Hussain. Mehdi Hussain is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Khalid, Ayesha, et al.. (2025). zk-DASTARK: A quantum-resistant, data authentication and zero-knowledge proof scheme for protecting data feed to smart contracts. Computers & Electrical Engineering. 123. 110089–110089. 2 indexed citations
2.
Hussain, Mehdi, et al.. (2025). Lightweight and Robust Android Ransomware Detection Using Behavioral Analysis and Feature Reduction. Computers, materials & continua/Computers, materials & continua (Print). 84(3). 5177–5199.
3.
Riaz, Qaiser, et al.. (2024). Unveiling Fall Origins: Leveraging Wearable Sensors to Detect Pre-Impact Fall Causes. IEEE Sensors Journal. 24(15). 24086–24095. 8 indexed citations
4.
Hussain, Mehdi, et al.. (2024). Forensic analysis of web browsers lifecycle: A case study. Journal of Information Security and Applications. 85. 103839–103839. 3 indexed citations
5.
Sahu, Adıtya Kumar & Mehdi Hussain. (2024). Introduction to the special section on recent advances in multimedia forensics for cyber security and data tampering (VSI-forens). Computers & Electrical Engineering. 118. 109348–109348. 1 indexed citations
7.
Hussain, Mehdi, et al.. (2023). Hiding EPR and watermark in medical images using repeated pixel differencing. Multimedia Tools and Applications. 83(15). 43577–43605. 1 indexed citations
8.
Asif, Muhammad, et al.. (2021). Automated Analysis of Pakistani Websites’ Compliance with GDPR and Pakistan Data Protection Act. 234–239. 2 indexed citations
9.
Hussain, Mehdi, et al.. (2021). Towards A Distributed Ledger Based Verifiable Trusted Protocol For VANET. 3. 1–6. 4 indexed citations
10.
Hussain, Mehdi, et al.. (2020). An Intelligent Autonomous Robotic System for Precision Farming. 133–139. 4 indexed citations
11.
Hussain, Mehdi, et al.. (2018). Image steganography in spatial domain: A survey. Signal Processing Image Communication. 65. 46–66. 310 indexed citations breakdown →
12.
Hussain, Mehdi, et al.. (2017). Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE. IETE Technical Review. 35(1). 53–63. 41 indexed citations
13.
Hussain, Mehdi, et al.. (2016). A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Processing Image Communication. 50. 44–57. 78 indexed citations
14.
Hussain, Mehdi, et al.. (2016). Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images. Symmetry. 8(6). 41–41. 35 indexed citations
15.
Arif, Muhammad, Khubaib Amjad Alam, & Mehdi Hussain. (2015). Challenges and Issues in DATA Stream: A Review. International Journal of Hybrid Information Technology. 8(3). 155–164. 1 indexed citations
16.
Alam, Khubaib Amjad, et al.. (2015). Crime Mining: A Comprehensive Survey. International Journal of u- and e- Service Science and Technology. 8(2). 357–364. 8 indexed citations
17.
Hussain, Mehdi, et al.. (2015). Intelligent Agent Based Architectures for E-Learning System: Survey. International Journal of u- and e- Service Science and Technology. 8(6). 9–24. 4 indexed citations
18.
Hussain, Mehdi, et al.. (2013). A Survey of Image Steganography Techniques. International Journal of Advanced Science and Technology. 54. 113–124. 74 indexed citations
19.
Hussain, Mehdi & Mohammed Hussain. (2011). A high bandwidth covert channel in network protocol. 5332. 1–6. 16 indexed citations
20.
Hussain, Mehdi & Mehdi Hussain. (2011). Embedding data in edge boundaries with high PSNR. 6. 1–6. 16 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026