Kwame Ofosuhene Peasah

Kwame Ofosuhene Peasah
Kwame Nkrumah University Of Science and Technology | KNUST · Department of Computer Science

About

7
Publications
226
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1
Citation
Introduction

Publications

Publications (7)
Article
Full-text available
Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering images a prime target for cyber-attacks. Also, studies examining image steganography techniques are...
Article
Full-text available
Mobile Ad Hoc Networks (MANETs) are made up of battery-powered wireless devices that create an ad hoc network for communication. The power used by these devices can be very high since their batteries are limited and their topology fluctuates. This makes energy consumption and network longevity critical issues to be considered for routing algorithms...
Article
Full-text available
The absence of a central framework, the constantly fluctuating layout, the restricted resources, and the dispersed structure of Mobile Ad hoc Networks (MANETs), among other characteristics, make routing a critical problem. A proficient, energy-aware routing path selection algorithm can improve network performance. In this paper, a routing mechanism...
Article
Deniable authentication (DA) assures message authentication between sets of participants. The actual participants can be certain about the messages’ authenticity but cannot prove it to any third party after the event. In applications such as location-based service (LBS) systems, DA is inevitably relevant to assure the coercion-free state of its usa...

Network