About
4
Publications
418
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4
Citations
Citations since 2017
Publications
Publications (4)
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by...
Zigbee is a technology operates under IEEE 802.15.4 standard. It has been developed to define a specific set of communication protocols that support short-range, low cost and low power consumption wireless networking that are designed for control and monitoring applications. These applications are merely require security, reliability, in addition t...
Hiding information by embedding secret
data into an innocuous medium is often
referred to as steganography. Steganography
can be applied electronically by taking a
message (a binary file) and some sort of
cover (often a sound or image file) and
combining both to obtain a “stego-object”.
The stego-object is essentially the cover with
its redundant i...