UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 20
1.
  • Lightweight Encryption Tech... Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications
    Hasan, Mohammad Kamrul; Islam, Shayla; Sulaiman, Rossilawati ... IEEE access, 2021, Letnik: 9
    Journal Article
    Recenzirano
    Odprti dostop

    The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, ...
Celotno besedilo

PDF
2.
  • Enhanced Flipping Technique... Enhanced Flipping Technique to Reduce Variability in Image Steganography
    Kamil, Samar; Abdullah, Siti Norul Huda Sheikh; Hasan, Mohammad Kamrul ... IEEE access, 2021, Letnik: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Steganography algorithms hide the secret message in the cover image and provide imperceptibility to the attacker. The Least Significant Bit (LSB) algorithm is the preferred data hiding method. In ...
Celotno besedilo

PDF
3.
  • Secure Reversible Data Hidi... Secure Reversible Data Hiding Using Block-Wise Histogram Shifting
    Kamil Khudhair, Samar; Sahu, Monalisa; K. R., Raghunandan ... Electronics (Basel), 03/2023, Letnik: 12, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Reversible data hiding (RDH) techniques recover the original cover image after data extraction. Thus, they have gained popularity in e-healthcare, law forensics, and military applications. However, ...
Celotno besedilo
4.
  • An improved watermarking al... An improved watermarking algorithm for robustness and imperceptibility of data protection in the perception layer of internet of things
    Hasan, Mohammad Kamrul; Kamil, Samar; Shafiq, Muhammad ... Pattern recognition letters, December 2021, 2021-12-00, 20211201, Letnik: 152
    Journal Article
    Recenzirano

    Emergence of Internet of Things (IoT) and modern digital applications such as digital financial services and deliveries make it easy to reproduce and re-distribute digital contents thus give room to ...
Celotno besedilo
5.
  • Binary nonogram puzzle base... Binary nonogram puzzle based data hiding technique for data security
    Kamil, Samar; Abdullah, Siti Norul Huda Sheikh; Hasan, Mohammad Kamrul ... Multimedia tools and applications, 2024/1, Letnik: 83, Številka: 2
    Journal Article
    Recenzirano

    Data security is one of the critical challenges for digital information. The existing steganography algorithms hide confidential data in the cover media to preserve the presence of hidden data. One ...
Celotno besedilo
6.
Celotno besedilo

PDF
7.
Celotno besedilo

PDF
8.
  • The Rise of Ransomware: A Review of Attacks, Detection Techniques, and Future Challenges
    Kamil, Samar; Siti Norul, Huda Sheikh Abdullah; Firdaus, Ahmad ... 2022 International Conference on Business Analytics for Technology and Security (ICBATS), 2022-Feb.-16
    Conference Proceeding

    Cybersecurity is important in the field of information technology. One most recent pressing issue is information security. When we think of cybersecurity, the first thing that comes to mind is ...
Celotno besedilo
9.
  • Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography
    Kamil, Samar; Ayob, Masri; Sheikh Abdullah, Siti Norul Huda ... 2018 Cyber Resilience Conference (CRC), 2018-Nov.
    Conference Proceeding

    Optimal match in the cover media was found to be effective for accurate data hiding and improving the visual quality of steganography algorithms. Lately, several optimized steganography algorithms ...
Celotno besedilo
10.
  • Lightweight Cryptography for Resource Constraint Devices: Challenges and Recommendation
    Mohamad Al-Aboosi, Ahmad Mustafa; Kamil, Samar; Sheikh Abdullah, Siti Norul Huda ... 2021 3rd International Cyber Resilience Conference (CRC), 2021-Jan.-29
    Conference Proceeding

    In the recent few years, data communication through the Internet of Things (IoT) network is increased exponentially. However, the data is prone to several attacks on the network. The most popular ...
Celotno besedilo
1 2
zadetkov: 20

Nalaganje filtrov