Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Khurram Gulzar Rana"'
Autor:
Allah Ditta, Muhammad Azeem, Shahid Naseem, Khurram Gulzar Rana, Muhammad Adnan Khan, Zafar Iqbal
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 5, Pp 2180-2191 (2022)
With the advancement of technology, the maximum data hiding capacity and security of cover objects have become a very challenging task for researchers, particularly in text carrier. Text carrier depicts low hiding capacity but more secure for the det
Externí odkaz:
https://doaj.org/article/b468f4adcad1486da6e535ab03d3c040
Publikováno v:
2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA).
Steganography is a fundamental and foremost approach that is used to ensure confidentiality of secret data. It is an art, which ensures invisible communication by concealing secret information in cover media through scientific techniques. The text st
In database management system (DBMS) retrieving data through structure query language is an essential aspect to find better execution plan for performance. In this paper, we incorporated database objects to optimize query execution time and its cost
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::913104b2604523da25e3bc8ea953dc97
https://zenodo.org/record/4271264
https://zenodo.org/record/4271264
Publikováno v:
ICCNS
Providing secure communication in different environments is very vital in an adhoc network. One of the important security threats in wireless adhoc networks are routing attacks. These attacks are used to disconnect a sensor network from its central b
Publikováno v:
International Journal of Electronic Security and Digital Forensics. 11:1
Cryptography and steganography are foremost techniques used to ensure security and confidentiality of secret information. In steganography, data hiding capacity with security is a great challenge for the researchers. In present scheme, a novel approa
Autor:
Haiyang Yu, Allah Ditta, Cai Yongquan, Muhammad Qasim Memon, Khurram Gulzar Rana, Muhammad Azeem
Publikováno v:
International Journal of Electronic Security and Digital Forensics. 10:61
In recent years, information security has become a very important topic for researchers as well as military and government officials. For secure communication, it is necessary to develop novel ways to hide information. For this purpose, steganography
Publikováno v:
International Journal of Information and Computer Security. 10:437
From centuries, information security has been an attractive topic for security officials, intruders, hackers and other communication sectors throughout the world. Cryptography and steganography are widely practiced for secure communication over the i
Autor:
Cai Yongquan, Muhammad Azeem, Haiyang Yu, Sijjad Ali Khuhro, Allah Ditta, Khurram Gulzar Rana
Publikováno v:
International Journal of Wireless and Mobile Computing. 14:16
Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV)
Publikováno v:
International Journal of Wireless and Mobile Computing. 9:363
Ad hoc networks are a wireless technology foreseen to be used increasingly in the near future due to their data acquisition and processing abilities. Ad hoc networks are infrastructure-less networks and they suffer from several types of routing attac
Publikováno v:
International Journal of Wireless and Mobile Computing. 9:317
Encoding a message in plain text is an ancient art. Using null cipher NC is a great challenge because it requires extensive human efforts and intelligence. In this study, we propose a mechanism which can detect the existence of NC steganography in te