
Kwame Ofosuhene Peasah- Kwame Nkrumah University of Science and Technology
Kwame Ofosuhene Peasah
- Kwame Nkrumah University of Science and Technology
About
8
Publications
1,083
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (8)
Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering images a prime target for cyber-attacks. Also, studies examining image steganography techniques are...
The increasing reliance on digital communication networks has made information security a critical concern for individuals, organizations, and governments worldwide. Man-in-the-middle (MITM) attacks are significant, prevalent, and damaging concerning cyber-attacks. Detecting MitM attacks is complex due to their stealthy nature and the sophisticated...
Mobile Ad Hoc Networks (MANETs) are made up of battery-powered wireless devices that create an ad hoc network for communication. The power used by these devices can be very high since their batteries are limited and their topology fluctuates. This makes energy consumption and network longevity critical issues to be considered for routing algorithms...
The absence of a central framework, the constantly fluctuating layout, the restricted resources, and the dispersed structure of Mobile Ad hoc Networks (MANETs), among other characteristics, make routing a critical problem. A proficient, energy-aware routing path selection algorithm can improve network performance. In this paper, a routing mechanism...
Deniable authentication (DA) assures message authentication between sets of participants. The actual participants can be certain about the messages’ authenticity but cannot prove it to any third party after the event. In applications such as location-based service (LBS) systems, DA is inevitably relevant to assure the coercion-free state of its usa...