Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Samar Kamil"'
Autor:
Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan
Publikováno v:
IEEE Access, Vol 9, Pp 47731-47742 (2021)
The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Du
Externí odkaz:
https://doaj.org/article/a6e734ce2c1c495ebe177f8475535afe
Publikováno v:
IEEE Access, Vol 9, Pp 168981-168998 (2021)
Steganography algorithms hide the secret message in the cover image and provide imperceptibility to the attacker. The Least Significant Bit (LSB) algorithm is the preferred data hiding method. In this method, the least significant bit of the cover im
Externí odkaz:
https://doaj.org/article/52d6f913135a4c648be45b4978af8f61
Publikováno v:
Asia-Pacific Journal of Information Technology and Multimedia, Vol 7, Iss 2-2, Pp 53-62 (2018)
The steganography is prone to number of attacks such as geomatical, salt & pepper, gaussian, median filtering, attacks. To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography al
Externí odkaz:
https://doaj.org/article/4bf7f627bc8c49529d59b7d44c3c72f6
Autor:
Samar Kamil, Siti Norul Huda Sheikh Abdullah, Mohammad Kamrul Hasan, Yazan M. Alomari, Zaid Alyasseri
Publikováno v:
Multimedia Tools and Applications.
Publikováno v:
Electronics; Volume 12; Issue 5; Pages: 1222
Reversible data hiding (RDH) techniques recover the original cover image after data extraction. Thus, they have gained popularity in e-healthcare, law forensics, and military applications. However, histogram shifting using a reversible data embedding
Autor:
E. Saravana Kumar, Samar Kamil, Muhammad Shafiq, Nazmus S. Nafi, Mohammad Kamrul Hasan, Rajiv Vincent, Yuvaraj S
Publikováno v:
Pattern Recognition Letters. 152:283-294
Emergence of Internet of Things (IoT) and modern digital applications such as digital financial services and deliveries make it easy to reproduce and re-distribute digital contents thus give room to so many copyright violations of illegal use of cont
Publikováno v:
2022 International Conference on Business Analytics for Technology and Security (ICBATS).
Publikováno v:
Asia-Pacific Journal of Information Technology and Multimedia. :53-62
The steganography is prone to number of attacks such as geomatical, salt & pepper, gaussian, median filtering, attacks. To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography al
Publikováno v:
2018 Cyber Resilience Conference (CRC).
Optimal match in the cover media was found to be effective for accurate data hiding and improving the visual quality of steganography algorithms. Lately, several optimized steganography algorithms including least significant bit (LSB) match, genetic
Publikováno v:
International Journal of Advanced Computer Science and Applications. 9
The ever-escalating attacks on the internet network are due to rapid technological growth. In order to surmount such challenges, multi-layer security algorithms were developed by hybridizing cryptography and steganography techniques. Consequently, th