- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Cryptography and Residue Arithmetic
- Cryptography and Data Security
- Coding theory and cryptography
- Digital Media Forensic Detection
- Cryptographic Implementations and Security
- Internet Traffic Analysis and Secure E-voting
- User Authentication and Security Systems
- Vehicle License Plate Recognition
- Blockchain Technology Applications and Security
- Evacuation and Crowd Dynamics
- Gender and Technology in Education
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Low-power high-performance VLSI design
- Music and Audio Processing
- Human Mobility and Location-Based Analysis
- Cellular Automata and Applications
- Data Visualization and Analytics
- Cybercrime and Law Enforcement Studies
- Urban and Freight Transport Logistics
- Energy Efficient Wireless Sensor Networks
- Online and Blended Learning
- Video Analysis and Summarization
Umm al-Qura University
2014-2025
Pamukkale University
2022
King Saud University
2011
King Fahd University of Petroleum and Minerals
2000-2010
Sabancı Üniversitesi
2005
Oregon State University
2003
Abstract Over the last couple of decades, community question‐answering sites (CQAs) have been a topic much academic interest. Scholars often leveraged traditional machine learning (ML) and deep (DL) to explore ever‐growing volume content that CQAs engender. To clarify current state CQA literature has used ML DL, this paper reports systematic review. The goal is summarise synthesise major themes research related (i) questions, (ii) answers (iii) users. final review included 133 articles....
Abstract This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting‐based secret sharing. The trustfulness of utilised secret‐sharing as an applicable privacy creation tool for the real‐life complex platforms. research adjusts embedding over innovative redistribution to be embedded spread all images. anticipated technique guaranteed scatter share bits implanting at different least significant image pixels boosting up trust...
Image based steganography utilize the images as cover media to hide secret data. The common technique used in this field replaces least significant bits (LSB) of image pixels with intended bits. Several improvements enhance security LSB method have been presented earlier. This paper proposed a new improved that takes advantage 24 each pixel RGB using two one channel indicate existence data other channels. stego does not depend on separate key take out management overhead. Instead, it is size...
This paper presents a new steganography approach suitable for Arabic texts. It can be classified under feature coding methods. The hides secret information bits within the letters benefiting from their inherited points. To note specific holding bits, scheme considers two features, existence of points in and redundant extension character. We use pointed with to hold bit ‘one’ un-pointed ‘zero’. technique is found attractive other languages having similar texts such as Persian Urdu. Keywords —...
Data hiding technologies aim to hide the existence of secret information within digital covers such as images by causing unnoticeable degradation their quality. Reducing image distortion and increasing embedding capacity are main points that data techniques revolved around. This article proposes two high payload methods with stego quality using Hue-Saturation-Value (HSV) colour model. The first method is hue-based (HBE) employs H plane for one or bits in non-grey pixels. second uses three...
The COVID-19 pandemic had major impact on all worldwide traveling in 2020 and 2021, which also affected Muslims' ability to perform the ritual of Hajj Umrah. Due pandemic, Saudi government limited number pilgrims ensure their safety prevent spread disease. This reduction residents Makkah Madinah holy cities, whom were often involved a variety activities during seasons. Twitter was one channels that many people organizations utilized communicate with each other regarding general issues as...
In this paper, we present a new algorithm for RGB image based steganography. Our introduces the concept of storing variable number bits in each channel (R, G or B) pixel on actual color values that pixel: lower component stores higher bits. offers very high capacity cover media compared to other existing algorithms. We experimental results showing superiority our algorithm. also comparative with similar algorithms
This paper proposed an enhanced system for securing sensitive text-data on personal computer benefitting from the combination of both techniques: cryptography and steganography. The security is generated by involving RSA followed video based steganography as two sequential layers to insure best possible gaining advantages both. study modeled implemented it be tested explore relation between security, capacity data dependency. experimentations covered testing within 15 different size videos...
Short period monitoring and emergency notification of healthcare signals is becoming affordable with existence internet things (IoT) support. However, IoT does not prevent challenges that may hinder the appropriate safe spread medical solutions. Confidentiality data vital, making a real fear requesting cryptography. The limitations in memory, computations processing, power consumptions, small-size devices contradict robust encryption process asking for help low-weight-cryptography to handle...
This paper proposed an innovative approach for reversible data hiding (RDH) within images in such a way that the image can be accurately recovered after extracting data. The work presented challenging task due to need compromise between quality of stego-image and capacity hidden It is used applications reconstruct original without any distortion, as medical diagnosis, remote sensing military maps. aim this study improving RDH methods using interpolation-based scheme. (IRDH) scheme improves...