Skip to main content
Steganography is the art of message hiding in a cover signal without attracting attention. The requirements of the good steganography algorithm are security, capacity, robustness and imperceptibility, all them are contradictory,... more
    • by 
    • High Capacity and Inaudibility Audio Steganography Scheme
Steganography is an information hiding technique where secret message is embedded into unsuspicious cover signal. Measurement of good steganography algorithm includes security, capacity, robustness and imperceptibility. These measures are... more
    • by 
    •   5  
      Audio Signal ProcessingWavelet TransformsInformation HidingInformation Assurance and Security
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, security, and copyright. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message.... more
    • by 
    • by 
In this study, a novel and high embedding capacity audio steganography scheme based on Lifting Wavelet Transform (LWT) and adaptive embedding positions is proposed. Specifically, the message data is inserted in the imperceptible positions... more
    • by 
    • by 
The demand for more spectrums in a smart grid communication network is a significant challenge in originally scarce spectrum resources. Cognitive radio (CR) is a powerful technique for solving the spectrum scarcity problem by adapting the... more
    • by 
Video compression is a process of reducing the size of a video file without degrading the video quality. There is a great deal of redundancy between frames of a video sequence. There is also redundancy with in the image of a single frame... more
    • by 
In public communication networks such as the internet, users can easily share and access multimedia products such as images, videos, and audios. Copyright protection is a vital issue to prove the ownership of products in these networks.... more
    • by 
Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a... more
    • by 
Digital video magnification is a computer-based microscope, which is useful to detect subtle changes to human eyes in recorded videos. This technology can be employed in several areas such as medical, biological, mechanical and physical... more
    • by  and +1
    •   3  
      Image Processingmotion magnificationEulerian video magnification (EVM)
The proposed device represents a new design and implementation of a smart system that helps blind and elderly people. The system can provide several services such as alert a blind person to avoid collision and calling family and/or... more
    • by 
This paper proposes a modification approach for phased-based EVM in order to reduce the processing time without effect the quality of the magnified video. The proposed approach applies a resizing process on the input video using Lanczos-3... more
    • by 
    • Computer Science and Information System
Abstract—This paper introduces an efficient low complexity multidimensional DWT architecture. The proposed architecture is based on a lifting-scheme for the CohenDaubechies-Feauveau (CDF) 5/3 DWT filter. It consists of low complexity... more
    • by  and +2
    • Image Processing
Abstract— Monitoring assets such as remote electrical substations and remote small power stations often pose challenges to utility companies. Often, cheap solutions to monitor and to provide an online control for these assets are by... more
    • by  and +2
    •   2  
      Embedded SystemsLightweight Block Ciphers
This paper presents a hardware implementation of the PRINCE block cipher in Field Programmable Gate Array (FPGA). In many security applications, the software implementations of cryptographic algorithms are slow and inefficient. In... more
    • by  and +3
    •   2  
      Embedded SystemsLightweight Block Ciphers
This study presents a high execution-speed and low-resource hardware IP-Core of PRINCE light weight block cipher on a Field Programmable Gate Arrays (FPGA). The new FPGA IP-core is to speed-up the performance of PRINCE, superseding... more
    • by  and +1
    •   4  
      Computer EngineeringEmbedded SystemsCryptographyLightweight Block Ciphers
Presently electronic devices such as smart phones, games consoles have requirement for heterogeneous tasks that need to execute in real time. To meet this challenging requirement heterogeneous multi core processor is the likely platforms... more
    • by 
Monitoring and managing data from a remote asset to optimize maintenance and operation schedules using wireless communication have received more attention recently than before. Meanwhile, the rapid development of global system for mobile... more
    • by 
    •   2  
      CryptographyLightweight Block Ciphers
Monitoring and managing data from a remote asset to optimize maintenance and operation schedules using wireless communication have received more attention recently than before. Meanwhile, the rapid development of global system for mobile... more
    • by 
    •   4  
      Computer ScienceInformation TechnologyCryptographyLightweight Block Ciphers