Progress of IoT research technologies and applications serving Hajj and Umrah

MK Shambour, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
The term IoT technology is associated with many fields, including scientific, commercial,
industrial, health, transportation and other fields, which became a necessity of daily life …

Improving data hiding within colour images using hue component of HSV colour space

FS Hassan, A Gutub - CAAI Transactions on Intelligence …, 2022 - Wiley Online Library
Data hiding technologies aim to hide the existence of secret information within digital covers
such as images by causing unnoticeable degradation to their quality. Reducing the image …

Improving grayscale steganography to protect personal information disclosure within hotel services

AK Sahu, A Gutub - Multimedia Tools and Applications, 2022 - Springer
An unauthorized leak of information that is not tolerable always implies inadequate or poor
security measures of information. Globally, the hospitality industry has in the recent past …

Efficient image reversible data hiding technique based on interpolation optimization

FS Hassan, A Gutub - Arabian Journal for Science and Engineering, 2021 - Springer
Reversible data hiding (RDH) within images is the process of hiding secret data into a cover
image in a way that the image can be completely recovered after extracting the embedded …

A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition

S Altalhi, A Gutub - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
In recent years, the number of cyber-attacks increased affecting different application types
and targets. Many studies tried to focus on proposing solutions to detect imminent and …

[HTML][HTML] An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers

M Es-sabry, N El Akkad, L Khrissi, K Satori… - Egyptian Informatics …, 2024 - Elsevier
In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging
the potential of four 1D chaotic maps–the Logistic map, Tent map, Chebyshev map, and …

Refining image steganography distribution for higher security multimedia counting-based secret-sharing

T AlKhodaidi, A Gutub - Multimedia Tools and Applications, 2021 - Springer
Counting-based secret sharing is becoming a vital efficient multimedia technique for raising
the security of sensitive data especially when collective access to data are essential. Secret …

[HTML][HTML] Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication

Z Gan, S Song, L Zhou, D Han, J Fu, X Chai - Journal of King Saud …, 2022 - Elsevier
Image encryption is an effective method to protect private images by converting them into
meaningless ones, but many current image encryption algorithms still have security and …

A novel multi-wing chaotic system with FPGA implementation and application in image encryption

H Cai, J Sun, Z Gao, H Zhang - Journal of Real-Time Image Processing, 2022 - Springer
In this paper, a two-wing chaotic system is transformed into a four-wing chaotic system and
an eight-wing chaotic system using fractal processing and the dynamic characteristics of …

Duple color image encryption system based on 3-d nonequilateral Arnold transform for IIot

H Huang, Z Cai - IEEE Transactions on Industrial Informatics, 2022 - ieeexplore.ieee.org
In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, which
contains sensitive information. Therefore, how to protect data security is an important …