PSNR vs SSIM: imperceptibility quality assessment for image steganography

DRIM Setiadi - Multimedia Tools and Applications, 2021 - Springer
Peak signal to noise ratio (PSNR) and structural index similarity (SSIM) are two measuring
tools that are widely used in image quality assessment. Especially in the steganography …

Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

Progress of IoT research technologies and applications serving Hajj and Umrah

MK Shambour, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
The term IoT technology is associated with many fields, including scientific, commercial,
industrial, health, transportation and other fields, which became a necessity of daily life …

Improving data hiding within colour images using hue component of HSV colour space

FS Hassan, A Gutub - CAAI Transactions on Intelligence …, 2022 - Wiley Online Library
Data hiding technologies aim to hide the existence of secret information within digital covers
such as images by causing unnoticeable degradation to their quality. Reducing the image …

[HTML][HTML] Securing matrix counting-based secret-sharing involving crypto steganography

F Al-Shaarani, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
The privacy and confidentiality of our data are more fundamental to our existence than ever,
especially with our growing dependence on online services and the transfer of information …

HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud

P Chinnasamy, P Deepalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
Technology that is perfect is free of vulnerability. Technological growth offers users online
data storage and access to it from anywhere. Cloud computing is a model that provides data …

Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons

A Gutub, F Al-Shaarani - Arabian Journal for Science and Engineering, 2020 - Springer
The protection of confidential information transmitted over the Internet and restricting access
to specific classified data have become a major security and privacy issue. To conceal the …

A new unified image encryption algorithm based on a lifting transformation and chaos

Y Zhang - Information sciences, 2021 - Elsevier
Image encryption is one of the most effective means to ensure the security of image
information in network communications. A new unified image encryption system with …

Efficient reversible data hiding multimedia technique based on smart image interpolation

FS Hassan, A Gutub - Multimedia Tools and Applications, 2020 - Springer
Reversible data hiding (RDH) within images is the process of securing data into cover
images without degradation. Its challenge is to hide a large payload while taking into …