Zobrazeno 1 - 10
of 133
pro vyhledávání: '"Adnan Gutub"'
Publikováno v:
IET Image Processing, Vol 18, Iss 1, Pp 129-139 (2024)
Abstract Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to r
Externí odkaz:
https://doaj.org/article/5a3ea26b8c8b4c45b12e29c9a89f5a18
Autor:
Adnan Gutub
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 8, Iss 2, Pp 440-452 (2023)
Abstract This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting‐based secret sharing. The trustfulness of shares utilised secret‐sharing as an applicable privacy creation tool f
Externí odkaz:
https://doaj.org/article/d6cc62a162c14d5ab8c471bb81780da5
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 8, Iss 1, Pp 95-117 (2023)
Abstract Over the last couple of decades, community question‐answering sites (CQAs) have been a topic of much academic interest. Scholars have often leveraged traditional machine learning (ML) and deep learning (DL) to explore the ever‐growing vo
Externí odkaz:
https://doaj.org/article/31ff979b52314fac900614b96da70b62
Publikováno v:
Egyptian Informatics Journal, Vol 23, Iss 4, Pp 177-191 (2022)
Despite the rapidly growing studies on Arabic text steganography (ATS) noted recently; systematic, in-depth, and critical reviews are in scarcity due to high overlap or low segregation level among the existing review articles linked to this research
Externí odkaz:
https://doaj.org/article/e2a772816db6414f862990f983be8935
Autor:
Muhannad Abu‐Hashem, Adnan Gutub
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 7, Iss 2, Pp 278-291 (2022)
Abstract Due to current technology enhancement, molecular databases have exponentially grown requesting faster efficient methods that can handle these amounts of huge data. Therefore, Multi‐processing CPUs technology can be used including physical
Externí odkaz:
https://doaj.org/article/b295ba4e911643d3bc9046e08cbb2aed
Autor:
Fatuma Saeid Hassan, Adnan Gutub
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 5, Pp 2017-2030 (2022)
This paper proposed an innovative approach for reversible data hiding (RDH) within images in such a way that the image can be accurately recovered after extracting the data. The work presented a challenging task due to the need to compromise between
Externí odkaz:
https://doaj.org/article/20ef21261a1a43a9b2cf8a4458720797
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 4, Pp 1343-1356 (2022)
The need to protect confidential data stored on personal computers (PCs) or sent to other parties has increased significantly. Therefore, a secure, high-capacity strategy is needed to cover the data contained within media and make it difficult to det
Externí odkaz:
https://doaj.org/article/7ab37a28ae1f4d36bd71ec2de43c8d0d
Autor:
Fatuma Saeid Hassan, Adnan Gutub
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 7, Iss 1, Pp 56-68 (2022)
Abstract Data hiding technologies aim to hide the existence of secret information within digital covers such as images by causing unnoticeable degradation to their quality. Reducing the image distortion and increasing the embedding capacity are the m
Externí odkaz:
https://doaj.org/article/d12c422771204c47af26c3aaa37559c5
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 8, Pp 963-974 (2021)
Steganography is the process of hiding data within multimedia communication between parties by embedding the secret data inside a carrier file to be protected during its transmission. This paper addresses the problem of hiding information within the
Externí odkaz:
https://doaj.org/article/526a3e3bafac4e4984d2a73a062e0cdd
Publikováno v:
Journal of Information Security and Cybercrimes Research, Vol 2, Iss 1, Pp 73-82 (2019)
In this paper, we propose a modification for security authentication systems in mobile devices. Our enhancement is designed to secure information transformation over the internet by combining hash, cryptography and steganography mechanisms. We used t
Externí odkaz:
https://doaj.org/article/ab70589fdb5f4acf81b91b1e5a785c9b