Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

[HTML][HTML] Systematic literature review and analysis for Arabic text steganography method practically

NA Roslan, NI Udzir, R Mahmod, A Gutub - Egyptian Informatics Journal, 2022 - Elsevier
Despite the rapidly growing studies on Arabic text steganography (ATS) noted recently;
systematic, in-depth, and critical reviews are in scarcity due to high overlap or low …

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

[HTML][HTML] Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing

S Athanere, R Thakur - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, cloud servers are gathering an increasing amount of data. Data is commonly
stored on cloud servers in the form of ciphertext to protect security and concealment of data …

A privacy-preserving cryptosystem for IoT E-healthcare

R Hamza, Z Yan, K Muhammad, P Bellavista… - Information …, 2020 - Elsevier
Privacy preservation has become a prerequisite for modern applications in the cloud, social
media, Internet of things (IoT), and E-healthcare systems. In general, health and medical …

The fast image encryption algorithm based on lifting scheme and chaos

Y Zhang - Information sciences, 2020 - Elsevier
Image encryption technology is one of the most important means of image information
security. Most image encryption algorithms are based on a permutation− diffusion structure …

[HTML][HTML] Securing matrix counting-based secret-sharing involving crypto steganography

F Al-Shaarani, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
The privacy and confidentiality of our data are more fundamental to our existence than ever,
especially with our growing dependence on online services and the transfer of information …

[HTML][HTML] DSTATCOM allocation in distribution networks considering load variations using bat algorithm

T Yuvaraj, K Ravi, KR Devabalaji - Ain Shams Engineering Journal, 2017 - Elsevier
This paper proposes a new method of scheduling for optimal placement and sizing of
Distribution STATic COMpensator in the radial distribution networks to minimize the power …

Improving grayscale steganography to protect personal information disclosure within hotel services

AK Sahu, A Gutub - Multimedia Tools and Applications, 2022 - Springer
An unauthorized leak of information that is not tolerable always implies inadequate or poor
security measures of information. Globally, the hospitality industry has in the recent past …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …