Adnan Abdul-Aziz Gutub
Orcid: 0000-0003-0923-202XAffiliations:
- Umm Al-Qura University, Makkah, Saudi Arabia
- King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia (former)
According to our database1,
Adnan Abdul-Aziz Gutub
authored at least 62 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on uqu.edu.sa
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., January, 2024
High performance image steganography integrating IWT and Hamming code within secret sharing.
IET Image Process., 2024
2023
Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication.
Multim. Tools Appl., December, 2023
Integrating machine learning and features extraction for practical reliable color images steganalysis classification.
Soft Comput., October, 2023
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier.
J. Inf. Secur. Appl., August, 2023
Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing.
CAAI Trans. Intell. Technol., June, 2023
Analysis of community question-answering issues via machine learning and deep learning: State-of-the-art review.
CAAI Trans. Intell. Technol., March, 2023
Redefining food safety traceability system through blockchain: findings, challenges and open issues.
Multim. Tools Appl., 2023
2022
Improving grayscale steganography to protect personal information disclosure within hotel services.
Multim. Tools Appl., 2022
Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation.
Multim. Tools Appl., 2022
Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme.
J. King Saud Univ. Comput. Inf. Sci., 2022
Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses.
J. King Saud Univ. Comput. Inf. Sci., 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication.
Int. J. Speech Technol., 2022
Int. J. Inf. Secur. Priv., 2022
Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication.
Int. J. Inf. Secur. Priv., 2022
Scalable shares generation to increase participants of counting-based secret sharing technique.
Int. J. Inf. Comput. Secur., 2022
CAAI Trans. Intell. Technol., 2022
Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology.
CAAI Trans. Intell. Technol., 2022
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data.
IEEE Access, 2022
2021
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding.
Multim. Tools Appl., 2021
Refining image steganography distribution for higher security multimedia counting-based secret-sharing.
Multim. Tools Appl., 2021
Multim. Tools Appl., 2021
Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing.
J. King Saud Univ. Comput. Inf. Sci., 2021
J. King Saud Univ. Comput. Inf. Sci., 2021
A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition.
J. Ambient Intell. Humaniz. Comput., 2021
2020
Efficient reversible data hiding multimedia technique based on smart image interpolation.
Multim. Tools Appl., 2020
Smart expansion of target key for more handlers to access multimedia counting-based secret sharing.
Multim. Tools Appl., 2020
Hiding shares by multimedia image steganography for optimized counting-based secret sharing.
Multim. Tools Appl., 2020
Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications.
Multim. Tools Appl., 2020
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression.
J. King Saud Univ. Comput. Inf. Sci., 2020
2019
Multim. Tools Appl., 2019
Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications.
Multim. Tools Appl., 2019
Security enhancement of shares generation process for multimedia counting-based secret-sharing technique.
Multim. Tools Appl., 2019
Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications.
Int. J. E Health Medical Commun., 2019
2015
2014
Proceedings of the 5th International Conference on Ambient Systems, 2014
2013
2012
2011
Proceedings of the Software Engineering and Computer Systems, 2011
2010
Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations.
J. Signal Process. Syst., 2010
ISC Int. J. Inf. Secur., 2010
2009
Inf. Secur. J. A Glob. Perspect., 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Improving security and capacity for Arabic text steganography using 'Kashida' extensions.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
High speed hardware architecture to compute galois fields GF(p) montgomery inversion with scalability features.
IET Comput. Digit. Tech., 2007
Area Flexible GF(2<sup>k</sup>) Elliptic Curve Cryptography Coprocessor.
Int. Arab J. Inf. Technol., 2007
Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007
2006
Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers.
Int. Arab J. Inf. Technol., 2006
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
2004
Integr., 2004
2003
High performance elliptic curve GF(2<sup>k</sup>) cryptoprocessor architecture for multimedia.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
Fast elliptic curve cryptographic processor architecture based on three parallel GF(2<sup>k</sup>) bit level pipelined digit serial multipliers.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
Power-time flexible architecture for GF(2<sup>k</sup>) elliptic curve cryptosystem computation.
Proceedings of the 13th ACM Great Lakes Symposium on VLSI 2003, 2003
2002
Proceedings of the 2002 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2002), 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002