قسم الأمن السيبراني - كلية الحاسبات
كلية الحاسبات
سعودي
-
ذكر
-
Offline Efficient Signature Authentication Using Octave Convolution Neural Network
Springer-KFUPM, Arabian Journal for Science and Engineering, 2024
Upgrading script watermarking robustness of unusual-to-tolerate functional confirmation by secret-sharing
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2023
Data reorganization for image encryption: presentation in the data of hare
Taylor & Francis, Journal of Cyber Security Technology, 2024
Improving data hiding within colour images using hue component of HSV colour space
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022
Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022
Is blind image steganalysis practical using feature-based classification?
Springer, Multimedia Tools and Applications, 2023
Coronavirus Impact on Human Feelings During 2021 Hajj Season via Deep Learning Critical Twitter Analysis
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2022
Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2023
Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication
Springer, Multimedia Tools and Applications, 2023
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier
ELSEVIER, Journal of Information Security and Applications, 2023
Integrating machine learning and features extraction for practical reliable color images steganalysis classification
Springer, Soft Computing, 2023
High performance image steganography integrating IWT and Hamming code within secret sharing
IET - WILEY, IET Image Processing, 2023
Improving data hiding within colour images using hue component of HSV colour space
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021
Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021
Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022
Analysis of community question‐answering issues via machine learning and deep learning: State‐of‐the‐art review
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022
Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing
Springer-KFUPM, Arabian Journal for Science and Engineering, 2022
Emerging Arabic text watermarking utilizing combinations of different diacritics
Springer-KFUPM, Arabian Journal for Science and Engineering, 2023
Smart fine-tuning of target key generation for trusted counting-based secret sharing
Springer-KFUPM, Arabian Journal for Science and Engineering, 2024
Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches
Springer, Multimedia Tools and Applications, 2024
Regulating Kashida Arabic steganography to improve security and capacity performance
Springer, Multimedia Tools and Applications, 2024
Emerging Arabic text watermarking utilizing combinations of different diacritics
Springer-KFUPM, Arabian Journal for Science and Engineering, 2024
Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2023
Improving data hiding within colour images using hue component of HSV colour space
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021
Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021
Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing
2022
Analysis of community question answering issues via machine learning and deep learning: State of the art review
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022
High performance image steganography integrating IWT and Hamming code within secret sharing
IET - WILEY, IET Image Processing, 2023
Integrating machine learning and features extraction for practical reliable color images steganalysis classification
Springer, Soft Computing, 2023
Is blind image steganalysis practical using feature-based classification?
Springer, Multimedia Tools and Applications, 2023
Upgrading script watermarking robustness of unusual-to-tolerate functional confirmation by secret-sharing
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2023
Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication
Springer, Multimedia Tools and Applications, 2023
Coronavirus Impact on Human Feelings During 2021 Hajj Season via Deep Learning Critical Twitter Analysis
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2023
Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing
Springer-KFUPM, Arabian Journal for Science and Engineering, 2022
Dynamic smart random preference for higher medical image confidentiality
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2022
Arabic text watermarking tuned for medical e-record semi-authentication
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2022
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data
IEEE, IEEE ACCESS, 2022
Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation
Springer, Multimedia Tools and Applications, 2022
Improving grayscale steganography to protect personal information disclosure within hotel services
Springer, Multimedia Tools and Applications, 2022
Securing Matrix Counting-Based Secret-Sharing Involving Crypto Steganography
ELSEVIER, Journal of King Saud University – Computer and Information Sciences, 2022
Systematic literature review and analysis for Arabic text steganography method practically
ELSEVIER, Egyptian Informatics Journal, 2022
Improving data hiding within colour images using hue component of HSV colour space
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022
Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022
Progress of IoT Research Technologies and Applications Serving Hajj and Umrah
Springer-KFUPM, Arabian Journal for Science and Engineering, 2022
Novel Arabic e-Text Watermarking Supporting Partial Dishonesty Based on Counting-Based Secret Sharing
Springer-KFUPM, Arabian Journal for Science and Engineering, 2022
Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography
Springer-KFUPM, Arabian Journal for Science and Engineering, 2022
AI-Based Mobile Edge Computing for IoT: Applications, Challenges, and Future Scope
Springer-KFUPM, Arabian Journal for Science and Engineering, 2022
Novel Arabic e-Text Watermarking Supporting Partial Dishonesty Based on Counting-Based Secret Sharing
Springer-KFUPM, Arabian Journal for Science and Engineering, 2021
Systematic literature review and analysis for Arabic text steganography method practically
ELSEVIER, Egyptian Informatics Journal, 2022
Improving data hiding within colour images using hue component of HSV colour space
IET - WILEY, CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier
ELSEVIER, Journal of Information Security and Applications, 2023
Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme
ELSEVIER, Journal of King Saud University – Computer and Information Sciences, 2022
Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses
ELSEVIER, Journal of King Saud University – Computer and Information Sciences, 2021
Personal Privacy Evaluation of Smart Devices Applications Serving Hajj and Umrah Rituals
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2021
Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2021
Redefining food safety traceability system through blockchain: findings, challenges and open issues
Springer, Multimedia Tools and Applications, 2023
Discrepancies of remote techno‑tolerance due to COVID‑19 pandemic within Arab middle‑east countries
2023
Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication
Springer, International Journal of Speech Technology, 2021
Varying PRNG to improve image cryptography implementation
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2021
Remodeling randomness prioritization to boost-up security of RGB image encryption
Springer, Multimedia Tools and Applications, 2021
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
Springer, Multimedia Tools and Applications, 2020
Refining image steganography distribution for higher security multimedia counting-based secret-sharing
Springer, Multimedia Tools and Applications, 2020
Efficient reversible data hiding multimedia technique based on smart image interpolation
Springer, Multimedia Tools and Applications, 2020
Secure Shares Generation via M-Blocks Partitioning for Counting-Based Secret Sharing
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2020
Smart expansion of target key for more handlers to access multimedia counting-based secret sharing
Springer, Multimedia Tools and Applications, 2020
Hiding Shares by Multimedia Image Steganography for Optimized Counting-Based Secret Sharing
Springer, Multimedia Tools and Applications, 2020
Arabic text watermarking tuned for medical e-record semi-authentication
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2022
Arabic text watermarking tuned for medical e-record semi-authentication
Academic Publication Council of Kuwait University, Journal of Engineering Research (JER), 2022
Automating Global Threat-Maps Generation via Advancements of News Sensors and AI
Springer-KFUPM, Arabian Journal for Science and Engineering, 2022
Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility
IGI Global, International Journal of Information Security and Privacy (IJISP), 2022
Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing
IET (IEE) - Wiley, CAAI Transactions on Intelligence Technology, 2022
Improving grayscale steganography to protect personal information disclosure within hotel services
Springer, Multimedia Tools and Applications, 2022
Regulating Watermarking Semi-Authentication of Multimedia Audio via Counting-Based Secret Sharing
Pamukkale University, Pamukkale University Journal of Engineering Sciences, 2022
Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology
IET (IEE) - Wiley, CAAI Transactions on Intelligence Technology, 2021
Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography
Springer - KFUPM, Arabian Journal for Science and Engineering (AJSE), 2022
Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation
Springer, Multimedia Tools and Applications, 2022
Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication
IGI Global, International Journal of Information Security and Privacy (IJISP), 2022
Remodeling Randomness Prioritization to Boost-up Security of RGB Image Encryption
Springer, Multimedia Tools and Applications, 2021
Varying PRNG to improve image cryptography implementation
Kuwait University, Journal of Engineering Research (JER), 2021
Progress of IoT Research Technologies and Applications Serving Hajj and Umrah
Springer - KFUPM, Arabian Journal for Science and Engineering (AJSE), 2022
Securing Matrix Counting-Based Secret-Sharing Involving Crypto Steganography
Elsevier, Journal of King Saud University - Computer and Information Sciences, 2022
Enhancing Medical Data Security via Combining Elliptic Curve Cryptography with 1-LSB and 2-LSB Image Steganography
INT JOURNAL COMPUTER SCIENCE & NETWORK SECURITY-IJCSNS , DAE-SANG OFFICE 301, SANGDO 5 DONG 509-1, SEOUL, SOUTH KOREA, International Journal of Computer Science and Network Security (IJCSNS), 2020
A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition
Springer, Journal of Ambient Intelligence and Humanized Computing, 2021
Involving Spaces of Unicode Standard Within Irreversible Arabic Text Steganography for Practical Implementations
Springer & KFUPM, Arabian Journal for Science and Engineering (AJSE), 2021
Functionality-Improved Arabic Text Steganography Based on Unicode Features
Springer & KFUPM, Arabian Journal for Science and Engineering (AJSE), 2020
Efficient Image Reversible Data Hiding Technique Based on Interpolation Optimization
Springer & KFUPM, Arabian Journal for Science and Engineering (AJSE), 2021
AI Based Mobile Edge Computing for IoT: Applications, Challenges, and Future Scope
Springer - KFUPM, Arabian Journal for Science and Engineering (AJSE), 2022
Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections
INT JOURNAL COMPUTER SCIENCE & NETWORK SECURITY-IJCSNS , DAE-SANG OFFICE 301, SANGDO 5 DONG 509-1, SEOUL, SOUTH KOREA, International Journal of Computer Science and Network Security (IJCSNS), 2020
Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons
Springer & KFUPM, Arabian Journal for Science and Engineering (AJSE), 2020
Preventing Multiple Accessing Attacks via Efficient Integration of Captcha Crypto Hash Functions
INT JOURNAL COMPUTER SCIENCE & NETWORK SECURITY-IJCSNS , DAE-SANG OFFICE 301, SANGDO 5 DONG 509-1, SEOUL, SOUTH KOREA,, International Journal of Computer Science and Network Security (IJCSNS), 2020
Cybercrime on Transportation Airline
Hilaris SRL, Journal of Forensic Research, 2020
Scalable shares generation to increase participants of counting-based secret sharing technique
Inderscience, International Journal of Information and Computer Security (IJICS), 2021
Refining image steganography distribution for higher security multimedia counting-based secret-sharing
Springer, Multimedia Tools and Applications, 2020
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
Springer, Multimedia Tools and Applications, 2020
Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications
Naif Arab University for Security Sciences (NAUSS), Journal of Information Security and Cybercrimes Research (JISCR), 2020
Protecting Medical Records against Cybercrimes within Hajj Period by 3-layer Security
HBRP Publication, Recent Trends in Information Technology and Its Application, 2019
Smart Expansion of Target Key for More Handlers to Access Multimedia Counting-Based Secret Sharing
Springer, Multimedia Tools and Applications, 2020
Securing Data via Cryptography and Arabic Text Steganography
Springer, SN Computer Science, 2021
Hiding Shares by Multimedia Image Steganography for Optimized Counting-Based Secret Sharing
Springer, Multimedia Tools and Applications, 2020
Image Steganography to Facilitate Online Students Account System
Amity Global Business School, Review of Business and Technology Research (RBTR), 2019
Motivating Teachers to Use Information Technology in Educational Process within Saudi Arabia
Inderscience Publishers, International Journal of Technology Enhanced Learning (IJTEL), 2020
Efficient Reversible Data Hiding Multimedia Technique Based on Smart Image Interpolation
Springer, Multimedia Tools and Applications, 2020
Secure Shares Generation via M-Blocks Partitioning for Counting-Based Secret Sharing
Kuwait University, Journal of Engineering Research, 2020
Sensing e-Banking Cybercrimes Vulnerabilities via Smart Information Sciences Strategies
RAS Publishers, RAS Engineering and Technology, 2020
Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability
Springer & KFUPM, Arabian Journal for Science and Engineering (AJSE), 2020
Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography
INT JOURNAL COMPUTER SCIENCE & NETWORK SECURITY-IJCSNS , DAE-SANG OFFICE 301, SANGDO 5 DONG 509-1, SEOUL, SOUTH KOREA, International Journal of Computer Science and Network Security (IJCSNS), 2020