Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

The fast image encryption algorithm based on lifting scheme and chaos

Y Zhang - Information sciences, 2020 - Elsevier
Image encryption technology is one of the most important means of image information
security. Most image encryption algorithms are based on a permutation− diffusion structure …

[HTML][HTML] Securing matrix counting-based secret-sharing involving crypto steganography

F Al-Shaarani, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
The privacy and confidentiality of our data are more fundamental to our existence than ever,
especially with our growing dependence on online services and the transfer of information …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …

Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform

OS Faragallah, HS El-sayed, A Afifi… - Optics and Lasers in …, 2021 - Elsevier
Nowadays, secure multimedia applications become a hot research issue because of rapid
evolution in the application of multimedia over the Internet and wireless communications …

Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage

A Gutub, K Alaseri - Arabian Journal for Science and Engineering, 2020 - Springer
This paper presented new models to hide sensitive data via Arabic text steganography. The
models are structured to serve personal remembrance of secret shares to be used within …

[HTML][HTML] Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme

FS Hassan, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
This paper proposed an innovative approach for reversible data hiding (RDH) within images
in such a way that the image can be accurately recovered after extracting the data. The work …

Engineering graphical captcha and AES crypto hash functions for secure online authentication

N Kheshaifaty, A Gutub - Journal of Engineering Research, 2023 - kuwaitjournals.org
Password alone is not trusted for user online authentication since mere password cannot
give full surety of proper access control. The authentication of the users is one of the key …

Watermarking images via counting-based secret sharing for lightweight semi-complete authentication

A Gutub - International Journal of Information Security and …, 2022 - igi-global.com
Watermarking is the process of embedding specific data to prove ownership copyright
authentication. It is needed whenever media-files are used without proper permission is …

Increasing participants using counting-based secret sharing via involving matrices and practical steganography

F Al-Shaarani, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
Secret sharing is an approach for accessing sensitive information by several authorized
participants. It shares the secret key in different forms among several authorized participants …