Dyala Rashid Ibrahim

Dyala Rashid Ibrahim
  • PhD
  • University of Science Malaysia

About

8
Publications
8,965
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
148
Citations
Current institution
University of Science Malaysia

Publications

Publications (8)
Article
Full-text available
Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addre...
Chapter
Full-text available
In this paper, we investigate two relatively new optimization algorithms in facial recognition, the grasshopper optimization algorithm (GOA) and binary dragonfly algorithm (BDA) which had the best performance out of 13 optimization algorithms that were compared. We investigate the effectiveness of both optimization algorithms alongside two classifi...
Article
Full-text available
Visual cryptography is an encryption technique that decomposes a secret image into multiple shares that are digitally "overlapped" based on logical operations to recover the original secret image. Each individual share cannot reveal clues about the secret image. Existing visual cryptography schemes suffer from problems such as pixel expansion , hig...
Article
Full-text available
Facial recognition as an authentication factor requires that facial images and features are tamper-free. Visual cryptography (VC) is commonly used for this purpose but leads to additional computational overhead and lower recognition accuracy. To address these issues, we propose a MFA system based on facial recognition that uses VC to secure biometr...
Article
Full-text available
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other neighbouring hosts. Two NDP messages are used during AR and DAD to communicate with one another in the sam...
Conference Paper
Full-text available
Modern identification cards can be used for a myriad of applications such as electronic passports, ATM cards or payment cards for public transportation. Despite their ease of use, user authentication is an important factor that must be taken into consideration. In addition to the use of passwords, biometric data such as fingerprints or iris images...
Conference Paper
Full-text available
The significant growth in biological data has driven computer scientists to create fast, efficient and accurate algorithms for searching databases at the fastest possible search responses, in order to assist the biologists to retrieve the existing information quickly from any biological database. Furthermore, the trends in parallel programming mode...

Network

Cited By