Adnan Abdul-Aziz Gutub

Orcid: 0000-0003-0923-202X

Affiliations:
  • Umm Al-Qura University, Makkah, Saudi Arabia
  • King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia (former)


According to our database1, Adnan Abdul-Aziz Gutub authored at least 62 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Is blind image steganalysis practical using feature-based classification?
Multim. Tools Appl., January, 2024

High performance image steganography integrating IWT and Hamming code within secret sharing.
IET Image Process., 2024

2023
Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication.
Multim. Tools Appl., December, 2023

Integrating machine learning and features extraction for practical reliable color images steganalysis classification.
Soft Comput., October, 2023

Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier.
J. Inf. Secur. Appl., August, 2023

Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing.
CAAI Trans. Intell. Technol., June, 2023

Analysis of community question-answering issues via machine learning and deep learning: State-of-the-art review.
CAAI Trans. Intell. Technol., March, 2023

Redefining food safety traceability system through blockchain: findings, challenges and open issues.
Multim. Tools Appl., 2023

2022
Improving grayscale steganography to protect personal information disclosure within hotel services.
Multim. Tools Appl., 2022

Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation.
Multim. Tools Appl., 2022

Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme.
J. King Saud Univ. Comput. Inf. Sci., 2022

Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses.
J. King Saud Univ. Comput. Inf. Sci., 2022

Securing matrix counting-based secret-sharing involving crypto steganography.
J. King Saud Univ. Comput. Inf. Sci., 2022

Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication.
Int. J. Speech Technol., 2022

Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility.
Int. J. Inf. Secur. Priv., 2022

Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication.
Int. J. Inf. Secur. Priv., 2022

Scalable shares generation to increase participants of counting-based secret sharing technique.
Int. J. Inf. Comput. Secur., 2022

Improving data hiding within colour images using hue component of HSV colour space.
CAAI Trans. Intell. Technol., 2022

Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology.
CAAI Trans. Intell. Technol., 2022

CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data.
IEEE Access, 2022

2021
Securing Data via Cryptography and Arabic Text Steganography.
SN Comput. Sci., 2021

Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding.
Multim. Tools Appl., 2021

Refining image steganography distribution for higher security multimedia counting-based secret-sharing.
Multim. Tools Appl., 2021

Remodeling randomness prioritization to boost-up security of RGB image encryption.
Multim. Tools Appl., 2021

Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing.
J. King Saud Univ. Comput. Inf. Sci., 2021

Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces.
J. King Saud Univ. Comput. Inf. Sci., 2021

A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition.
J. Ambient Intell. Humaniz. Comput., 2021

2020
Efficient reversible data hiding multimedia technique based on smart image interpolation.
Multim. Tools Appl., 2020

Smart expansion of target key for more handlers to access multimedia counting-based secret sharing.
Multim. Tools Appl., 2020

Hiding shares by multimedia image steganography for optimized counting-based secret sharing.
Multim. Tools Appl., 2020

Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications.
Multim. Tools Appl., 2020

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression.
J. King Saud Univ. Comput. Inf. Sci., 2020

2019
Counting-based secret sharing technique for multimedia applications.
Multim. Tools Appl., 2019

Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications.
Multim. Tools Appl., 2019

Security enhancement of shares generation process for multimedia counting-based secret-sharing technique.
Multim. Tools Appl., 2019

Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications.
Int. J. E Health Medical Commun., 2019

2015
Velocity-based modeling of physical interactions in dense crowds.
Vis. Comput., 2015

2014
Information Gathering Schemes for Collaborative Sensor Devices.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2013
Right of way - Asymmetric agent interactions in crowds.
Vis. Comput., 2013

2012
A Hajj And Umrah Location Classification System For Video Crowded Scenes
CoRR, 2012

2011
Subthreshold SRAM Designs for Cryptography Security Computations.
Proceedings of the Software Engineering and Computer Systems, 2011

2010
Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations.
J. Signal Process. Syst., 2010

High capacity steganography tool for Arabic text using 'Kashida'.
ISC Int. J. Inf. Secur., 2010

2009
Efficient Modular Squaring Algorithms for Hardware Implementation in GF(<i>p</i>).
Inf. Secur. J. A Glob. Perspect., 2009

Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography.
Proceedings of the Third International Conference on Network and System Security, 2009

Triple-A: Secure RGB image steganography based on randomization.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Improving security and capacity for Arabic text steganography using 'Kashida' extensions.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
RGB Intensity Based Variable-Bits Image Steganography.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
High speed hardware architecture to compute galois fields GF(p) montgomery inversion with scalability features.
IET Comput. Digit. Tech., 2007

Area Flexible GF(2<sup>k</sup>) Elliptic Curve Cryptography Coprocessor.
Int. Arab J. Inf. Technol., 2007

Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking.
Proceedings of the SECRYPT 2007, 2007

Parallelizing GF(P) elliptic curve cryptography computations for security and speed.
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007

2006
Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers.
Int. Arab J. Inf. Technol., 2006

Pipelining GF(P) Elliptic Curve Cryptography Computation.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2004
Efficient scalable VLSI architecture for Montgomery inversion in GF( <i>p</i>).
Integr., 2004

2003
High performance elliptic curve GF(2<sup>k</sup>) cryptoprocessor architecture for multimedia.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

VLSI core architecture for GF(p) elliptic curve crypto processor.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

Fast elliptic curve cryptographic processor architecture based on three parallel GF(2<sup>k</sup>) bit level pipelined digit serial multipliers.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

High radix parallel architecture for GF(p) elliptic curve processor.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Power-time flexible architecture for GF(2<sup>k</sup>) elliptic curve cryptosystem computation.
Proceedings of the 13th ACM Great Lakes Symposium on VLSI 2003, 2003

2002
Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation.
Proceedings of the 2002 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2002), 2002

Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002


  Loading...