A detailed review based on secure data transmission using cryptography and steganography

F Varghese, P Sasikala - Wireless Personal Communications, 2023 - Springer
During the last few decades, digital communication has played a vital role in various sectors
such as healthcare departments, banking, information technology companies, industries …

Advantages of using fog in IoT applications

AAA Sen, M Yamin - International Journal of Information Technology, 2021 - Springer
Edge computing (EC) has emerged as an attractive and interesting topic for research. It is an
extension of cloud computing, used for non-centralized computing with various new features …

An innovative method for preserving privacy in Internet of Things

M Yamin, Y Alsaawy, A B. Alkhodre, AA Abi Sen - Sensors, 2019 - mdpi.com
Preservation of privacy of users' personal data has always been a critical issue to deal with.
This issue in the Internet of Things (IoT), which facilitates millions of applications, has …

A comparative study between security and privacy

AA Abi Sen, AM Basahel - 2019 6th International Conference …, 2019 - ieeexplore.ieee.org
New technologies like the Internet of Things (IoT), Smart City (SC), and Big data have
changed the way we look towards life. These technologies created integration between the …

Enhanced artificial intelligence system for diagnosing and predicting breast cancer using deep learning

M Alfifi, MS Alrahhal, S Bataineh, M Mezher - 2020 - philpapers.org
Breast cancer is the leading cause of death among women with cancer. Computer-aided
diagnosis is an efficient method for assisting medical experts in early diagnosis, improving …

Enhanced-blind approach for privacy protection of IoT

AA Abi Sen, FA Eassa, K Jambi… - … on Computing for …, 2020 - ieeexplore.ieee.org
The Internet of Thing (IoT) refers to a vast number of things (eg, sensors) that are connected
to the internet to share data such as in smart cities, intelligent transportation, and healthcare …

[PDF][PDF] Bartering method for improving privacy of LBS

AM Basahel, AAA Sen, M Yamin, S Alqahtani - IJcSNS, 2019 - researchgate.net
Privacy issues are considered to be the greatest challenge facing the future of new
technologies. For this, much research has been presented in this domain and researchers …

A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters' Diacritics and Image Layers

SS Alqahtany, AB Alkhodre, A Al Abdulwahid… - Applied Sciences, 2023 - mdpi.com
Steganography is a widely used technique for concealing confidential data within images,
videos, and audio. However, using text for steganography has not been sufficiently explored …

Implementation of cryptography in steganography for enhanced security

H Antonio, PWC Prasad, A Alsadoon - Multimedia Tools and Applications, 2019 - Springer
The rapid development in technology has had a great influence on the exchange of
information. In this modern era, maintaining security during informationexchanges is …

[PDF][PDF] Swap obfuscation technique for preserving privacy of LBS

Y Alsaawy, AB Alkhodre, AAA Sen… - International Journal of …, 2019 - researchgate.net
Smart cities rely on Internet of Things (IoT) enabling technologies for ubiquitous
implementations, such as, Wireless Sensor Networks (WSN), which are used to sense the …