Adnan Gutub

ORCID: 0000-0003-0923-202X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cryptography and Residue Arithmetic
  • Cryptography and Data Security
  • Coding theory and cryptography
  • Digital Media Forensic Detection
  • Cryptographic Implementations and Security
  • Internet Traffic Analysis and Secure E-voting
  • User Authentication and Security Systems
  • Vehicle License Plate Recognition
  • Blockchain Technology Applications and Security
  • Evacuation and Crowd Dynamics
  • Gender and Technology in Education
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Low-power high-performance VLSI design
  • Music and Audio Processing
  • Human Mobility and Location-Based Analysis
  • Cellular Automata and Applications
  • Data Visualization and Analytics
  • Cybercrime and Law Enforcement Studies
  • Urban and Freight Transport Logistics
  • Energy Efficient Wireless Sensor Networks
  • Online and Blended Learning
  • Video Analysis and Summarization

Umm al-Qura University
2014-2025

Pamukkale University
2022

King Saud University
2011

King Fahd University of Petroleum and Minerals
2000-2010

Sabancı Üniversitesi
2005

Oregon State University
2003

Abstract Over the last couple of decades, community question‐answering sites (CQAs) have been a topic much academic interest. Scholars often leveraged traditional machine learning (ML) and deep (DL) to explore ever‐growing volume content that CQAs engender. To clarify current state CQA literature has used ML DL, this paper reports systematic review. The goal is summarise synthesise major themes research related (i) questions, (ii) answers (iii) users. final review included 133 articles....

10.1049/cit2.12081 article EN CAAI Transactions on Intelligence Technology 2022-05-04

Abstract This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting‐based secret sharing. The trustfulness of utilised secret‐sharing as an applicable privacy creation tool for the real‐life complex platforms. research adjusts embedding over innovative redistribution to be embedded spread all images. anticipated technique guaranteed scatter share bits implanting at different least significant image pixels boosting up trust...

10.1049/cit2.12093 article EN cc-by CAAI Transactions on Intelligence Technology 2022-04-05

Image based steganography utilize the images as cover media to hide secret data. The common technique used in this field replaces least significant bits (LSB) of image pixels with intended bits. Several improvements enhance security LSB method have been presented earlier. This paper proposed a new improved that takes advantage 24 each pixel RGB using two one channel indicate existence data other channels. stego does not depend on separate key take out management overhead. Instead, it is size...

10.4304/jetwi.2.1.56-64 article EN Journal of Emerging Technologies in Web Intelligence 2010-02-03

10.1007/s11042-017-5293-6 article EN Multimedia Tools and Applications 2017-11-02

This paper presents a new steganography approach suitable for Arabic texts. It can be classified under feature coding methods. The hides secret information bits within the letters benefiting from their inherited points. To note specific holding bits, scheme considers two features, existence of points in and redundant extension character. We use pointed with to hold bit ‘one’ un-pointed ‘zero’. technique is found attractive other languages having similar texts such as Persian Urdu. Keywords —...

10.5281/zenodo.1061621 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2007-03-21

Data hiding technologies aim to hide the existence of secret information within digital covers such as images by causing unnoticeable degradation their quality. Reducing image distortion and increasing embedding capacity are main points that data techniques revolved around. This article proposes two high payload methods with stego quality using Hue-Saturation-Value (HSV) colour model. The first method is hue-based (HBE) employs H plane for one or bits in non-grey pixels. second uses three...

10.1049/cit2.12053 article EN cc-by CAAI Transactions on Intelligence Technology 2021-06-24

10.1007/s13369-021-05838-7 article EN Arabian Journal for Science and Engineering 2021-06-28

10.1007/s13369-021-05529-3 article EN Arabian Journal for Science and Engineering 2021-03-20

The COVID-19 pandemic had major impact on all worldwide traveling in 2020 and 2021, which also affected Muslims' ability to perform the ritual of Hajj Umrah. Due pandemic, Saudi government limited number pilgrims ensure their safety prevent spread disease. This reduction residents Makkah Madinah holy cities, whom were often involved a variety activities during seasons. Twitter was one channels that many people organizations utilized communicate with each other regarding general issues as...

10.1016/j.jer.2023.100001 article EN cc-by-nc-nd Journal of Engineering Research 2023-01-28

In this paper, we present a new algorithm for RGB image based steganography. Our introduces the concept of storing variable number bits in each channel (R, G or B) pixel on actual color values that pixel: lower component stores higher bits. offers very high capacity cover media compared to other existing algorithms. We experimental results showing superiority our algorithm. also comparative with similar algorithms

10.1109/apscc.2008.105 article EN 2008-12-01

This paper proposed an enhanced system for securing sensitive text-data on personal computer benefitting from the combination of both techniques: cryptography and steganography. The security is generated by involving RSA followed video based steganography as two sequential layers to insure best possible gaining advantages both. study modeled implemented it be tested explore relation between security, capacity data dependency. experimentations covered testing within 15 different size videos...

10.26735/16587790.2018.006 article EN cc-by-nc Journal of Information Security and Cybercrimes Research 2018-01-01

Short period monitoring and emergency notification of healthcare signals is becoming affordable with existence internet things (IoT) support. However, IoT does not prevent challenges that may hinder the appropriate safe spread medical solutions. Confidentiality data vital, making a real fear requesting cryptography. The limitations in memory, computations processing, power consumptions, small-size devices contradict robust encryption process asking for help low-weight-cryptography to handle...

10.4018/ijehmc.2019100101 article EN International Journal of E-Health and Medical Communications 2019-08-13

This paper proposed an innovative approach for reversible data hiding (RDH) within images in such a way that the image can be accurately recovered after extracting data. The work presented challenging task due to need compromise between quality of stego-image and capacity hidden It is used applications reconstruct original without any distortion, as medical diagnosis, remote sensing military maps. aim this study improving RDH methods using interpolation-based scheme. (IRDH) scheme improves...

10.1016/j.jksuci.2020.07.008 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2020-07-21
Coming Soon ...