
Dyala Rashid Ibrahim- PhD
- University of Science Malaysia
Dyala Rashid Ibrahim
- PhD
- University of Science Malaysia
About
8
Publications
8,965
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
148
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (8)
Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addre...
In this paper, we investigate two relatively new optimization algorithms in facial recognition, the grasshopper optimization algorithm (GOA) and binary dragonfly algorithm (BDA) which had the best performance out of 13 optimization algorithms that were compared. We investigate the effectiveness of both optimization algorithms alongside two classifi...
Visual cryptography is an encryption technique that decomposes a secret image into multiple shares that are digitally "overlapped" based on logical operations to recover the original secret image. Each individual share cannot reveal clues about the secret image. Existing visual cryptography schemes suffer from problems such as pixel expansion , hig...
Facial recognition as an authentication factor requires that facial images and features are tamper-free. Visual cryptography (VC) is commonly used for this purpose but leads to additional computational overhead and lower recognition accuracy. To address these issues, we propose a MFA system based on facial recognition that uses VC to secure biometr...
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other neighbouring hosts. Two NDP messages are used during AR and DAD to communicate with one another in the sam...
Modern identification cards can be used for a myriad of applications such as electronic passports, ATM cards or payment cards for public transportation. Despite their ease of use, user authentication is an important factor that must be taken into consideration. In addition to the use of passwords, biometric data such as fingerprints or iris images...
The significant growth in biological data has driven computer scientists to create fast, efficient and accurate algorithms for searching databases at the fastest possible search responses, in order to assist the biologists to retrieve the existing information quickly from any biological database. Furthermore, the trends in parallel programming mode...