A review of text watermarking: theory, methods, and applications

NS Kamaruddin, A Kamsin, LY Por, H Rahman - IEEE Access, 2018 - ieeexplore.ieee.org
During the recent years, the issue of preserving the integrity of digital text has become a
focus of interest in the transmission of online content on the Internet. Watermarking has a …

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

A comparative analysis of information hiding techniques for copyright protection of text documents

M Taleby Ahvanooey, Q Li, HJ Shim… - Security and …, 2018 - Wiley Online Library
With the ceaseless usage of web and other online services, it has turned out that copying,
sharing, and transmitting digital media over the Internet are amazingly simple. Since the text …

[PDF][PDF] Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography

ESB Hureib, AA Gutub - International J Comp Sci Network Security …, 2020 - academia.edu
The paper proposed methods to protect secret information by encryption and hiding so as to
conceal and protect medical data and records from being hacked. This is done through …

Efficient image reversible data hiding technique based on interpolation optimization

FS Hassan, A Gutub - Arabian Journal for Science and Engineering, 2021 - Springer
Reversible data hiding (RDH) within images is the process of hiding secret data into a cover
image in a way that the image can be completely recovered after extracting the embedded …

Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage

A Gutub, K Alaseri - Arabian Journal for Science and Engineering, 2020 - Springer
This paper presented new models to hide sensitive data via Arabic text steganography. The
models are structured to serve personal remembrance of secret shares to be used within …

Watermarking images via counting-based secret sharing for lightweight semi-complete authentication

A Gutub - International Journal of Information Security and …, 2022 - igi-global.com
Watermarking is the process of embedding specific data to prove ownership copyright
authentication. It is needed whenever media-files are used without proper permission is …

Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation

AAA Gutub - Multimedia Tools and Applications, 2022 - Springer
Watermarking is the process of embedding secret data to prove ownership copyright
authentication validation. It is becoming urgently required within e-videos to provide proper …

Refining image steganography distribution for higher security multimedia counting-based secret-sharing

T AlKhodaidi, A Gutub - Multimedia Tools and Applications, 2021 - Springer
Counting-based secret sharing is becoming a vital efficient multimedia technique for raising
the security of sensitive data especially when collective access to data are essential. Secret …

Digital watermarking technique for text document protection using data mining analysis

U Khadam, MM Iqbal, MA Azam, S Khalid, S Rho… - IEEE …, 2019 - ieeexplore.ieee.org
In the current era, information security is on its top priority for all organizations. The
individuals, government officials, and military with the rapid development of Internet …