Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

[HTML][HTML] Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing

S Athanere, R Thakur - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, cloud servers are gathering an increasing amount of data. Data is commonly
stored on cloud servers in the form of ciphertext to protect security and concealment of data …

Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
This paper develops an effective encryption and steganography-based text extraction in IoT
using deep learning method. Initially, the input text and cover images are separately pre …

Improving grayscale steganography to protect personal information disclosure within hotel services

AK Sahu, A Gutub - Multimedia Tools and Applications, 2022 - Springer
An unauthorized leak of information that is not tolerable always implies inadequate or poor
security measures of information. Globally, the hospitality industry has in the recent past …

Watermarking images via counting-based secret sharing for lightweight semi-complete authentication

A Gutub - International Journal of Information Security and …, 2022 - igi-global.com
Watermarking is the process of embedding specific data to prove ownership copyright
authentication. It is needed whenever media-files are used without proper permission is …

Increasing participants using counting-based secret sharing via involving matrices and practical steganography

F Al-Shaarani, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
Secret sharing is an approach for accessing sensitive information by several authorized
participants. It shares the secret key in different forms among several authorized participants …

[HTML][HTML] Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

AA Bahaddad, KA Almarhabi… - Alexandria Engineering …, 2023 - Elsevier
In the digital era, information security becomes a challenging process that can be mitigated
by the utilization of cryptography and steganography techniques. Earlier studies on …

High performance image steganography integrating IWT and Hamming code within secret sharing

Z Saeidi, A Yazdi, S Mashhadi, M Hadian… - IET Image …, 2024 - Wiley Online Library
Steganography and secret sharing are schemes to increase the security of private
information against attackers. Steganography emphasizes secrecy while secret sharing …

An image encryption scheme based on a modified AES algorithm by using a variable S-box

A Hadj Brahim, A Ali Pacha, N Hadj Said - Journal of Optics, 2024 - Springer
This paper proposes a new image encryption scheme based on AES by using a variable S-
box. The plain image is divided into blocks of the same size (128 bits), and then each block …