Search
Search Results
-
Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing
Digital watermarking may be utilized to identify illicit usage of text as a means to protect its copyright. This research proposes an advanced...
-
Blockchain-based secure and transparent election and vote counting mechanism using secret sharing scheme
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting...
-
Novel Arabic e-Text Watermarking Supporting Partial Dishonesty Based on Counting-Based Secret Sharing
Nowadays, the proliferation done on information systems had led to an alarming increase in security breaches. This security trend is now viewed as an...
-
Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography
Secret sharing is an approach for accessing sensitive information by several authorized participants. It shares the secret key in different forms...
-
Trustworthy Target Key Alteration Hel** Counting-Based Secret Sharing Applicability
Sensitive information used online has resulted in the emergence of many security systems to be protected by secret keys. One of these security...
-
Blockwise Maximization of the Secret Key with Signal Breaks in Satellite-Based Quantum Key Distribution
AbstractSatellite-based quantum communication is a promising technology for the secure worldwide sharing of data because quantum states are conveyed...
-
Dual Secret Key Virtualization Through TCC Based Wavelength Allocation and BB84 Protocol in QKD over Optical Networks
In today's world, optical fiber networks are susceptible to numerous cyber-attacks and conventional key distribution techniques that are limited by...
-
Hiding Shares of Counting-Based Secret Sharing via Arabic Text Steganography for Personal Usage
This paper presented new models to hide sensitive data via Arabic text steganography. The models are structured to serve personal remembrance of...
-
Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing
The secret sharing scheme is a security tool that provides reliability and robustness for multi-user authentication systems. This work focuses on...
-
Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication
Audio recitation integrity verification of Holy Quran verses is becoming in urgent need due to lots of fake and untrusted recital claims affecting...
-
A Survey on Various Crypto-steganography Techniques for Real-Time Images
Information is the wealth of every organization and in the modern-day when information is shared digitally and via the internet, protecting this... -
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows
Dutta, Sabyasachi Bhore, Tamal Sardar, M. Kutubuddin Adhikari, Avishek Sakurai, KouichiWe put forward a construction of visual cryptographic scheme... -
A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem
It is not always in the best interests to rely on an individual to have control of entire sensitive information. This has led to the need for secret...
-
Data Mining of Privacy Preserving Based on Secret Sharing Technology
Based on Shamir secret sharing technology, this paper designs a vertical distributed association rule data mining algorithm with privacy-preserving... -
UniHaCh: Unicode and Hash Function Supported with Counting and Frequency Recurrence of Arabic Characters for Quranic Text Watermarking
The increasing usage of the Internet for sharing the digital Holy Quran reinforces the requirement for its protection from security breaches....
-
An Adaptive Security Scheme for Key Access on Cloud Computing
This research proposes a novel access management scheme that enables the seamless migration of hierarchical-like access policies to digital... -
Blockchain-Based Voting Scheme Against Malicious Attacks
In recent years, electronic voting has garnered increasing attention, particularly due to the advancements in blockchain technology, which have made... -
A Reliable Protocol for Data Aggregation and Optimized Routing in IoT WSNs based on Machine Learning
Data Aggregation for IoT-WSN, based on Machine Learning (ML), allows the Internet of Things (IoT) and Wireless Sensor Networks (WSN) to send accurate...
-
Emerging Arabic Text Watermarking Utilizing Combinations of Different Diacritics
Arabic text watermarking is the process of hiding private data for secure authentication and copyright protection. This research proposes different...
-
Practical Implementations of Remote Power Side-Channel and Fault-Injection Attacks on Multitenant FPGAs
Cloud computing environments increasingly provision FPGAs because of their fine-grained, highly parallel, and flexible hardware architecture. The...