Increasing participants using counting-based secret sharing via involving matrices and practical steganography

F Al-Shaarani, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
Secret sharing is an approach for accessing sensitive information by several authorized
participants. It shares the secret key in different forms among several authorized participants …

Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications

SMA Al-Nofaie, AAA Gutub - Multimedia Tools and Applications, 2020 - Springer
Steganography is used for multimedia data security. It is a process of hiding the data within
multimedia communication between the parties embedding the secret data inside a carrier …

A new fast double-chaotic based Image encryption scheme

RI Abdelfatah - Multimedia Tools and Applications, 2020 - Springer
In this paper, a new scheme for image encryption based on a double chaotic pseudo
random generator (DCPG), simple XOR and shift rotations operations is proposed. The …

[PDF][PDF] Image steganography to facilitate online students account system

S Almutairi, A Gutub, M Al-Ghamdi - Rev. Bus. Technol. Res, 2019 - researchgate.net
Image Steganography to Facilitate Online Students Account System Page 1 29/04/1441 1
MTMI-Mauritius International Conference 20-22 December 2019 Image Steganography to …

Dual-image based high image quality reversible hiding scheme with multiple folding zones

TC Lu, YC Lu, TN Vo - Multimedia Tools and Applications, 2019 - Springer
A dual-image technique is often used in reversible data hiding. In this technique, secret
information is concealed within a host image to generate two stego-images. In 2015, Lu et …

[PDF][PDF] Safia Meteb Awad Al-Nofaie & Adnan

AA Gutub - researchgate.net
Steganography is used for multimedia data security. It is a process of hiding the data within
multimedia communication between the parties embedding the secret data inside a carrier …