Kwame Ofosuhene Peasah

Kwame Ofosuhene Peasah
  • Kwame Nkrumah University of Science and Technology

About

8
Publications
1,083
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8
Citations
Introduction
Current institution
Kwame Nkrumah University of Science and Technology

Publications

Publications (8)
Article
Full-text available
Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering images a prime target for cyber-attacks. Also, studies examining image steganography techniques are...
Article
Full-text available
The increasing reliance on digital communication networks has made information security a critical concern for individuals, organizations, and governments worldwide. Man-in-the-middle (MITM) attacks are significant, prevalent, and damaging concerning cyber-attacks. Detecting MitM attacks is complex due to their stealthy nature and the sophisticated...
Article
Full-text available
Mobile Ad Hoc Networks (MANETs) are made up of battery-powered wireless devices that create an ad hoc network for communication. The power used by these devices can be very high since their batteries are limited and their topology fluctuates. This makes energy consumption and network longevity critical issues to be considered for routing algorithms...
Article
Full-text available
The absence of a central framework, the constantly fluctuating layout, the restricted resources, and the dispersed structure of Mobile Ad hoc Networks (MANETs), among other characteristics, make routing a critical problem. A proficient, energy-aware routing path selection algorithm can improve network performance. In this paper, a routing mechanism...
Article
Deniable authentication (DA) assures message authentication between sets of participants. The actual participants can be certain about the messages’ authenticity but cannot prove it to any third party after the event. In applications such as location-based service (LBS) systems, DA is inevitably relevant to assure the coercion-free state of its usa...

Network

Cited By