An introduction to image steganography techniques

AAJ Altaay, SB Sahib, M Zamani - … international conference on …, 2012 - ieeexplore.ieee.org
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …

[PDF][PDF] A secure model for prevention of black hole attack in wireless mobile ad hoc networks

TK Araghi, M Zamani, ABA Manaf… - … conference on applied …, 2013 - academia.edu
Implementing Ad hoc networks are becoming very prevalent during recent years. Security is
the most important issue for developing mobile ad hoc networks (MANETs). They expose to …

[PDF][PDF] International Journal of Advanced Trends in Computer Science and Engineering

AM Alqudah, H Alquraan, IA Qasmieh, A Alqudah… - International …, 2019 - arxiv.org
Deep Learning is the newest and the current trend of the machine learning field that paid a
lot of the researchers' attention in the recent few years. As a proven powerful machine …

Eteash-an enhanced tiny encryption algorithm for secured smart home

OR Oluwade, OM Olaniyi, YS Abdulsalam, LA Ajao… - 2021 - repository.futminna.edu.ng
The proliferation of the" Internet of Things"(IoT) and its applications have affected every
aspect of human endeavors from smart manufacturing, agriculture, healthcare, and …

Statistical steganalysis of four photo themes before embedding

AAJ Altaay, S bin Sahib… - … Conference on Advanced …, 2013 - ieeexplore.ieee.org
In order to analyze how the correlativity behavioral pattern would change after data
embedding, it needs to conduct a statistical analyze on average, maximum, minimum, and …

Secure OpenID authentication model by using Trusted Computing

E Ghazizadeh, ZS Shams Dolatabadi… - Abstract and Applied …, 2014 - Wiley Online Library
The growth of Internet online services has been very quick in recent years. Each online
service requires Internet users to create a new account to use the service. The problem can …

Enhanced tiny encryption algorithm for secure electronic health authentication system

YS Abdulsalam, OM Olaniyi… - International Journal of …, 2018 - inderscienceonline.com
One of the main worries circling the globe today is how to provide efficient and effective
quality health services. Conventionally, part of the constraints in making these efficient …

A novel wlan client puzzle against dos attack based on pattern matching

A Ordi, M Zamani, N Bashah Idris… - Mathematical …, 2015 - Wiley Online Library
Despite the popularity of 802.11 based networks, they suffer several types of DoS attack,
launched by an attacker whose aim is to make an access point (AP) unavailable to …

[PDF][PDF] A survey for prevention of black hole attacks in wireless mobile adhoc networks using cryptographic techniques

TK Araghi, M Zamani, ABA Manaf… - Latest Trends in …, 2014 - researchgate.net
Since MANET is getting more ubiquitous, the need for offering sufficient security
mechanisms in them seems noticeable. The security schemes measured in such networks …

Tasks security scheduling based on DPSO in heterogeneous grid environment

D Zhang, H Zhu, Y Wang, Z Miao - 2010 Second International …, 2010 - ieeexplore.ieee.org
For the task scheduling problem in the heterogeneous grid environment, a security benefit
function is constructed by considering the task scheduling demand for confidentiality …