We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 289 results
  1. Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing

    Digital watermarking may be utilized to identify illicit usage of text as a means to protect its copyright. This research proposes an advanced...

    Adnan Gutub, Esraa Almehmadi in Arabian Journal for Science and Engineering
    Article 16 November 2022
  2. Blockchain-based secure and transparent election and vote counting mechanism using secret sharing scheme

    Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting...

    Article 29 June 2022
  3. Novel Arabic e-Text Watermarking Supporting Partial Dishonesty Based on Counting-Based Secret Sharing

    Nowadays, the proliferation done on information systems had led to an alarming increase in security breaches. This security trend is now viewed as an...

    Esraa Almehmadi, Adnan Gutub in Arabian Journal for Science and Engineering
    Article 20 November 2021
  4. Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography

    Secret sharing is an approach for accessing sensitive information by several authorized participants. It shares the secret key in different forms...

    Faiza Al-Shaarani, Adnan Gutub in Arabian Journal for Science and Engineering
    Article 08 October 2021
  5. Trustworthy Target Key Alteration Hel** Counting-Based Secret Sharing Applicability

    Sensitive information used online has resulted in the emergence of many security systems to be protected by secret keys. One of these security...

    Taghreed AlKhodaidi, Adnan Gutub in Arabian Journal for Science and Engineering
    Article 06 March 2020
  6. Blockwise Maximization of the Secret Key with Signal Breaks in Satellite-Based Quantum Key Distribution

    Abstract

    Satellite-based quantum communication is a promising technology for the secure worldwide sharing of data because quantum states are conveyed...

    E. Ivchenko, A. Chernov, ... V. Kurochkin in Russian Microelectronics
    Article 01 December 2023
  7. Dual Secret Key Virtualization Through TCC Based Wavelength Allocation and BB84 Protocol in QKD over Optical Networks

    In today's world, optical fiber networks are susceptible to numerous cyber-attacks and conventional key distribution techniques that are limited by...

    Shravan Kumar Sehgal, Rashmi Gupta in Wireless Personal Communications
    Article 01 February 2024
  8. Hiding Shares of Counting-Based Secret Sharing via Arabic Text Steganography for Personal Usage

    This paper presented new models to hide sensitive data via Arabic text steganography. The models are structured to serve personal remembrance of...

    Adnan Gutub, Khaled Alaseri in Arabian Journal for Science and Engineering
    Article 04 July 2019
  9. Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing

    The secret sharing scheme is a security tool that provides reliability and robustness for multi-user authentication systems. This work focuses on...

    Adnan Gutub, Maimoona Al-Ghamdi in 3D Research
    Article 18 January 2019
  10. Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication

    Audio recitation integrity verification of Holy Quran verses is becoming in urgent need due to lots of fake and untrusted recital claims affecting...

    Article 04 November 2022
  11. A Survey on Various Crypto-steganography Techniques for Real-Time Images

    Information is the wealth of every organization and in the modern-day when information is shared digitally and via the internet, protecting this...
    Conference paper 2023
  12. Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows

    Dutta, Sabyasachi Bhore, Tamal Sardar, M. Kutubuddin Adhikari, Avishek Sakurai, KouichiWe put forward a construction of visual cryptographic scheme...
    Sabyasachi Dutta, Tamal Bhore, ... Kouichi Sakurai in Proceedings of the Fifth International Conference on Mathematics and Computing
    Conference paper 2021
  13. A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem

    It is not always in the best interests to rely on an individual to have control of entire sensitive information. This has led to the need for secret...

    Om Prakash Verma, Nitin Jain, S. K. Pal in Arabian Journal for Science and Engineering
    Article 25 July 2019
  14. Data Mining of Privacy Preserving Based on Secret Sharing Technology

    Based on Shamir secret sharing technology, this paper designs a vertical distributed association rule data mining algorithm with privacy-preserving...
    Conference paper 2020
  15. UniHaCh: Unicode and Hash Function Supported with Counting and Frequency Recurrence of Arabic Characters for Quranic Text Watermarking

    The increasing usage of the Internet for sharing the digital Holy Quran reinforces the requirement for its protection from security breaches....

    Majida Kazmi, Samreen Habib, ... Saad Ahmed Qazi in Arabian Journal for Science and Engineering
    Article 17 November 2023
  16. An Adaptive Security Scheme for Key Access on Cloud Computing

    This research proposes a novel access management scheme that enables the seamless migration of hierarchical-like access policies to digital...
    Darshan M. Patel, Kiran Kumari Patil, ... G. Shruthi in Soft Computing and Signal Processing
    Conference paper 2024
  17. Blockchain-Based Voting Scheme Against Malicious Attacks

    In recent years, electronic voting has garnered increasing attention, particularly due to the advancements in blockchain technology, which have made...
    Conference paper 2024
  18. A Reliable Protocol for Data Aggregation and Optimized Routing in IoT WSNs based on Machine Learning

    Data Aggregation for IoT-WSN, based on Machine Learning (ML), allows the Internet of Things (IoT) and Wireless Sensor Networks (WSN) to send accurate...

    Neeraj Chandnani, Chandrakant N. Khairnar in Wireless Personal Communications
    Article 15 April 2023
  19. Emerging Arabic Text Watermarking Utilizing Combinations of Different Diacritics

    Arabic text watermarking is the process of hiding private data for secure authentication and copyright protection. This research proposes different...

    Article 24 January 2024
  20. Practical Implementations of Remote Power Side-Channel and Fault-Injection Attacks on Multitenant FPGAs

    Cloud computing environments increasingly provision FPGAs because of their fine-grained, highly parallel, and flexible hardware architecture. The...
    Dina G. Mahmoud, Ognjen Glamočanin, ... Mirjana Stojilović in Security of FPGA-Accelerated Cloud Computing Environments
    Chapter 2024
Did you find what you were looking for? Share feedback.