Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Nameer N. EL-Emam"'
Publikováno v:
PeerJ Computer Science, Vol 8, p e1115 (2022)
The main challenge in steganography algorithms is balancing between the size of the secret message (SM) that is embedded in the cover image (CI) and the quality of the stego-image (SI). This manuscript proposes a new steganography algorithm to hide a
Externí odkaz:
https://doaj.org/article/d1620ba51e8c47f0ac9bdbdf73fce32e
Autor:
Maram Bani Younes, Nameer N. El-Emam
Publikováno v:
Intelligent Internet of Things for Smart Healthcare Systems ISBN: 9781003326182
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8a15468215c6f45d167a6e1f8a3aa8f2
https://doi.org/10.1201/9781003326182-5
https://doi.org/10.1201/9781003326182-5
Autor:
Amro Al-Said Ahmad, Nameer N. El-Emam
Publikováno v:
Intelligent Internet of Things for Smart Healthcare Systems ISBN: 9781003326182
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79c1cdf3b1574067df806586590ee5ea
https://doi.org/10.1201/9781003326182-7
https://doi.org/10.1201/9781003326182-7
Autor:
Shadi Elshare, Nameer N EL Emam
Publikováno v:
International Journal of Communication Networks and Information Security (IJCNIS). 10
Data-hiding using steganography algorithm becomes an important technique to prevent unauthorized users to have access to a secret data. In this paper, steganography algorithm has been constructed to hide a secret data in a gray and a color images, th
Publikováno v:
International Journal of Communication Networks and Information Security (IJCNIS). 13
Steganography algorithms have become a significant technique for preventing illegal users from obtaining secret data. In this paper, a deep hiding/extraction algorithm has been improved (IDHEA) to hide a secret message in colour images. The proposed
Autor:
Nameer N. El-Emam, Raneem Qaddoura
Publikováno v:
Cybersecurity ISBN: 9781003145042
Privacy preservation tools using particle swarm optimization (PSO) is one of the most common metaheuristics swarm intelligence algorithms [1]. It has been widely used for a large portion of optimization problems, as its implementation is scalable, ro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d3a3d37ff911278af864cbb261759041
https://doi.org/10.1201/9781003145042-11
https://doi.org/10.1201/9781003145042-11
Autor:
Nameer N. El-Emam, Maram Bani Younes
Publikováno v:
Cybersecurity ISBN: 9781003145042
Cybersecurity
Cybersecurity
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a2112b32a6d3ba052e70594da3bfce2
https://doi.org/10.1201/9781003145042-3
https://doi.org/10.1201/9781003145042-3
Cloud computing still has no standard definition, yet it is concerned with Internet or network on-demand delivery of resources and services. It has gained much popularity in last few years due to rapid growth in technology and the Internet. Many issu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::44af70adabb3104ed65ba758e9707de0
https://zenodo.org/record/4065842
https://zenodo.org/record/4065842
Autor:
Mofleh Al-Diabat, Nameer N. El-Emam
Publikováno v:
Applied Soft Computing. 37:830-846
Steganography architecture with seven security layers. New steganography algorithm.Proposed new intelligent technique.Proposed seven layers of security.Extract byte characteristics.Construct image segmentation. A three-phase intelligent technique has
Autor:
Nameer N. El-Emam
Publikováno v:
Computers & Security. 55:21-45
Proposed five layers of protection.Extract byte characteristics.Construct image segmentation.Learning system.Embedding and extracting secret message. A new steganography algorithm based on five protection layers has been suggested in this paper for e