The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems

A Darwish, AE Hassanien, M Elhoseny… - Journal of Ambient …, 2019 - Springer
Cloud Computing (CC) and the Internet of Things (IoT) have emerged as new platforms in
the ICT revolution of the twenty-first century. The adoption of the CloudIoT paradigm in the …

Analysis of various data security techniques of steganography: A survey

S Dhawan, R Gupta - Information Security Journal: A Global …, 2021 - Taylor & Francis
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security
is termed as a serious issue while communication of data is processed over the Internet …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

Improving data hiding within colour images using hue component of HSV colour space

FS Hassan, A Gutub - CAAI Transactions on Intelligence …, 2022 - Wiley Online Library
Data hiding technologies aim to hide the existence of secret information within digital covers
such as images by causing unnoticeable degradation to their quality. Reducing the image …

Improving grayscale steganography to protect personal information disclosure within hotel services

AK Sahu, A Gutub - Multimedia Tools and Applications, 2022 - Springer
An unauthorized leak of information that is not tolerable always implies inadequate or poor
security measures of information. Globally, the hospitality industry has in the recent past …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …

A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image

K Muhammad, M Sajjad, I Mehmood, S Rho… - Multimedia Tools and …, 2016 - Springer
Image Steganography is a thriving research area of information security where secret data is
embedded in images to hide its existence while getting the minimum possible statistical …

CNN-based anti-spoofing two-tier multi-factor authentication system

M Sajjad, S Khan, T Hussain, K Muhammad… - Pattern Recognition …, 2019 - Elsevier
Many hybrid and multimodal biometric recognition techniques have been presented to
provide secure and authentic systems, incorporating both soft and hard biometric schemes …

The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …