Despite the rapidly growing studies on Arabic text steganography (ATS) noted recently; systematic, in-depth, and critical reviews are in scarcity due to high overlap or low …
A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …
S Athanere, R Thakur - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, cloud servers are gathering an increasing amount of data. Data is commonly stored on cloud servers in the form of ciphertext to protect security and concealment of data …
Privacy preservation has become a prerequisite for modern applications in the cloud, social media, Internet of things (IoT), and E-healthcare systems. In general, health and medical …
Image encryption technology is one of the most important means of image information security. Most image encryption algorithms are based on a permutation− diffusion structure …
F Al-Shaarani, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
The privacy and confidentiality of our data are more fundamental to our existence than ever, especially with our growing dependence on online services and the transfer of information …
This paper proposes a new method of scheduling for optimal placement and sizing of Distribution STATic COMpensator in the radial distribution networks to minimize the power …
AK Sahu, A Gutub - Multimedia Tools and Applications, 2022 - Springer
An unauthorized leak of information that is not tolerable always implies inadequate or poor security measures of information. Globally, the hospitality industry has in the recent past …
A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for multi-user authentication systems. This work focus on improving the counting-based secret …