About
7
Publications
226
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1
Citation
Introduction
Skills and Expertise
Publications
Publications (7)
Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering images a prime target for cyber-attacks. Also, studies examining image steganography techniques are...
Mobile Ad Hoc Networks (MANETs) are made up of battery-powered wireless devices that create an ad hoc network for communication. The power used by these devices can be very high since their batteries are limited and their topology fluctuates. This makes energy consumption and network longevity critical issues to be considered for routing algorithms...
The absence of a central framework, the constantly fluctuating layout, the restricted resources, and the dispersed structure of Mobile Ad hoc Networks (MANETs), among other characteristics, make routing a critical problem. A proficient, energy-aware routing path selection algorithm can improve network performance. In this paper, a routing mechanism...
Deniable authentication (DA) assures message authentication between sets of participants. The actual participants can be certain about the messages’ authenticity but cannot prove it to any third party after the event. In applications such as location-based service (LBS) systems, DA is inevitably relevant to assure the coercion-free state of its usa...