Open Access
REVIEW
Shahab Ali Khan1, Tehseen Mazhar2,3,*, Syed Faisal Abbas Shah4, Wasim Ahmad1, Sunawar Khan2, Afsha BiBi5, Usama Shah1, Habib Hamam6,7,8,9
1 School of Arts and Creative Technology, University of Greater Manchester, Manchester Bolton, UK
2 School of Computer Science, National College of Business Administration and Economics, Lahore, Pakistan
3 Department of Computer Science and Information Technology, School Education Department, Government of Punjab, Layyah, Pakistan
4 Depertment of Computer Science, Virtual University of Pakistan, Lahore, Pakistan
5 Department of Computer and Software Technology, University of Swat, Swat, Pakistan
6 Faculty of Engineering, Université de Moncton, Moncton, NB, Canada
7 School of Electrical Engineering, University of Johannesburg, Johannesburg, South Africa
8 International Institute of Technology and Management (IITG), Av. Grandes Ecoles, Libreville, Gabon
9 Bridges for Academic Excellence-Spectrum, Tunis, Tunisia
* Corresponding Author: Tehseen Mazhar. Email:
(This article belongs to the Special Issue: Next-Generation Intelligent Networks and Systems: Advances in IoT, Edge Computing, and Secure Cyber-Physical Applications)
Computer Modeling in Engineering & Sciences https://doi.org/10.32604/cmes.2026.075882
Received 10 November 2025; Accepted 29 January 2026; Published online 10 March 2026
View
Download
Like
A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System
Saima Kanwal, Feng Tao, Ahmad...Introduction to the Special Issue on Blockchain Security
Zhihong Tian, Yanhui Guo, Shen...