default search action
Adnan Abdul-Aziz Gutub
Person information
- affiliation: Umm Al-Qura University, Makkah, Saudi Arabia
- affiliation (former): King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Zahra Saeidi, Ameneh Yazdi, Samaneh Mashhadi, Massoud Hadian Dehkordi, Adnan Gutub:
High performance image steganography integrating IWT and Hamming code within secret sharing. IET Image Process. 18(1): 129-139 (2024) - [j44]Ahd Aljarf, Haneen Zamzami, Adnan Gutub:
Is blind image steganalysis practical using feature-based classification? Multim. Tools Appl. 83(2): 4579-4612 (2024) - 2023
- [j43]Pradeep Kumar Roy, Sunil Saumya, Jyoti Prakash Singh, Snehasish Banerjee, Adnan Gutub:
Analysis of community question-answering issues via machine learning and deep learning: State-of-the-art review. CAAI Trans. Intell. Technol. 8(1): 95-117 (2023) - [j42]Adnan Gutub:
Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans. Intell. Technol. 8(2): 440-452 (2023) - [j41]J. Hemalatha, Sekar Mohan, Chandan Kumar, Adnan Gutub, Aditya Kumar Sahu:
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier. J. Inf. Secur. Appl. 76: 103541 (2023) - [j40]Ashish Singh, Adnan Gutub, Anand Nayyar, Muhammad Khurram Khan:
Redefining food safety traceability system through blockchain: findings, challenges and open issues. Multim. Tools Appl. 82(14): 21243-21277 (2023) - [j39]Adnan Gutub, Nafisah Kheshaifaty:
Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication. Multim. Tools Appl. 82(30): 46577-46609 (2023) - [j38]Ahd Aljarf, Haneen Zamzami, Adnan Gutub:
Integrating machine learning and features extraction for practical reliable color images steganalysis classification. Soft Comput. 27(19): 13877-13888 (2023) - 2022
- [j37]Reema Thabit, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Adnan Abdul-Aziz Gutub:
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data. IEEE Access 10: 65439-65458 (2022) - [j36]Fatuma Saeid Hassan, Adnan Gutub:
Improving data hiding within colour images using hue component of HSV colour space. CAAI Trans. Intell. Technol. 7(1): 56-68 (2022) - [j35]Muhannad A. Abu-Hashem, Adnan Gutub:
Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology. CAAI Trans. Intell. Technol. 7(2): 278-291 (2022) - [j34]Taghreed AlKhodaidi, Adnan Gutub:
Scalable shares generation to increase participants of counting-based secret sharing technique. Int. J. Inf. Comput. Secur. 17(1/2): 119-146 (2022) - [j33]Adnan Gutub:
Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication. Int. J. Inf. Secur. Priv. 16(1): 1-18 (2022) - [j32]Adnan Gutub:
Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility. Int. J. Inf. Secur. Priv. 16(1): 1-28 (2022) - [j31]Adnan Gutub:
Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication. Int. J. Speech Technol. 25(4): 997-1011 (2022) - [j30]Norah Alanazi, Esam Khan, Adnan Gutub:
Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses. J. King Saud Univ. Comput. Inf. Sci. 34(4): 1343-1356 (2022) - [j29]Fatuma Saeid Hassan, Adnan Gutub:
Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme. J. King Saud Univ. Comput. Inf. Sci. 34(5): 2017-2030 (2022) - [j28]Faiza Al-Shaarani, Adnan Gutub:
Securing matrix counting-based secret-sharing involving crypto steganography. J. King Saud Univ. Comput. Inf. Sci. 34(9): 6909-6924 (2022) - [j27]Adnan Abdul-Aziz Gutub:
Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation. Multim. Tools Appl. 81(7): 9527-9547 (2022) - [j26]Aditya Kumar Sahu, Adnan Gutub:
Improving grayscale steganography to protect personal information disclosure within hotel services. Multim. Tools Appl. 81(21): 30663-30683 (2022) - 2021
- [j25]Sahar Altalhi, Adnan Gutub:
A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. J. Ambient Intell. Humaniz. Comput. 12(11): 10209-10221 (2021) - [j24]Safia Meteb Awad Al-Nofaie, Adnan Gutub, Manal Al Ghamdi:
Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J. King Saud Univ. Comput. Inf. Sci. 33(8): 963-974 (2021) - [j23]Adnan Abdul-Aziz Gutub, Khaled Aydh Alaseri:
Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing. J. King Saud Univ. Comput. Inf. Sci. 33(9): 1108-1120 (2021) - [j22]Taghreed AlKhodaidi, Adnan Gutub:
Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multim. Tools Appl. 80(1): 1143-1173 (2021) - [j21]Norah Alanazi, Esam Khan, Adnan Gutub:
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multim. Tools Appl. 80(1): 1403-1431 (2021) - [j20]Budoor Obid Al-Roithy, Adnan Gutub:
Remodeling randomness prioritization to boost-up security of RGB image encryption. Multim. Tools Appl. 80(18): 28521-28581 (2021) - [j19]Malak Alkhudaydi, Adnan Gutub:
Securing Data via Cryptography and Arabic Text Steganography. SN Comput. Sci. 2(1): 46 (2021) - 2020
- [j18]Mishal Almazrooie, Azman Samsudin, Adnan Abdul-Aziz Gutub, Muhammad Syukri Salleh, Mohd. Adib Omar, Shahir Akram Hassan:
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J. King Saud Univ. Comput. Inf. Sci. 32(1): 24-34 (2020) - [j17]Safia Meteb Awad Al-Nofaie, Adnan Abdul-Aziz Gutub:
Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multim. Tools Appl. 79(1-2): 19-67 (2020) - [j16]Adnan Gutub, Maimoona Al-Ghamdi:
Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multim. Tools Appl. 79(11-12): 7951-7985 (2020) - [j15]Adnan Gutub, Taghreed AlKhodaidi:
Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multim. Tools Appl. 79(25-26): 17373-17401 (2020) - [j14]Fatuma Saeid Hassan, Adnan Gutub:
Efficient reversible data hiding multimedia technique based on smart image interpolation. Multim. Tools Appl. 79(39-40): 30087-30109 (2020)
2010 – 2019
- 2019
- [j13]Norah Alassaf, Adnan Gutub:
Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications. Int. J. E Health Medical Commun. 10(4): 1-15 (2019) - [j12]Adnan Gutub, Nouf Al-Juaid, Esam Khan:
Counting-based secret sharing technique for multimedia applications. Multim. Tools Appl. 78(5): 5591-5619 (2019) - [j11]Maimoona Al-Ghamdi, Manal Al Ghamdi, Adnan Gutub:
Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multim. Tools Appl. 78(12): 16283-16310 (2019) - [j10]Norah Alassaf, Adnan Gutub, Shabir A. Parah, Manal Al Ghamdi:
Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multim. Tools Appl. 78(23): 32633-32657 (2019) - 2015
- [j9]Sujeong Kim, Stephen J. Guy, Karl Hillesland, Basim Zafar, Adnan Abdul-Aziz Gutub, Dinesh Manocha:
Velocity-based modeling of physical interactions in dense crowds. Vis. Comput. 31(5): 541-555 (2015) - 2014
- [c16]Salah A. Aly, Turki A. AlGhamdi, Mohamed Salim, Hesham H. Amin, Adnan Gutub:
Information Gathering Schemes for Collaborative Sensor Devices. ANT/SEIT 2014: 1141-1146 - 2013
- [j8]Sean Curtis, Basim Zafar, Adnan Gutub, Dinesh Manocha:
Right of way - Asymmetric agent interactions in crowds. Vis. Comput. 29(12): 1277-1292 (2013) - 2012
- [i1]Hossam M. Zawbaa, Salah A. Aly, Adnan Abdul-Aziz Gutub:
A Hajj And Umrah Location Classification System For Video Crowded Scenes. CoRR abs/1209.3433 (2012) - 2011
- [c15]Adnan Abdul-Aziz Gutub:
Subthreshold SRAM Designs for Cryptography Security Computations. ICSECS (1) 2011: 104-110 - 2010
- [j7]Adnan Abdul-Aziz Gutub, Ahmed Al-Nazer:
High capacity steganography tool for Arabic text using 'Kashida'. ISC Int. J. Inf. Secur. 2(2): 107-118 (2010) - [j6]Lo'ai Ali Tawalbeh, Abidalrahman Mohammad, Adnan Abdul-Aziz Gutub:
Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations. J. Signal Process. Syst. 59(3): 233-244 (2010)
2000 – 2009
- 2009
- [j5]Lo'ai Ali Tawalbeh, Saed Swedan, Adnan Abdul-Aziz Gutub:
Efficient Modular Squaring Algorithms for Hardware Implementation in GF(p). Inf. Secur. J. A Glob. Perspect. 18(3): 131-138 (2009) - [c14]Fahd Al-Haidari, Adnan Gutub, Khalid Al-Kahsah, Jameel Hamodi:
Improving security and capacity for Arabic text steganography using 'Kashida' extensions. AICCSA 2009: 396-399 - [c13]Adnan Gutub, Ayed Al-Qahtani, Abdulaziz Tabakh:
Triple-A: Secure RGB image steganography based on randomization. AICCSA 2009: 400-403 - [c12]Ahmed Al-Nazer, Adnan Abdul-Aziz Gutub:
Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography. NSS 2009: 447-451 - 2008
- [c11]Mohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub:
RGB Intensity Based Variable-Bits Image Steganography. APSCC 2008: 1322-1327 - 2007
- [j4]Adnan Abdul-Aziz Gutub:
Area Flexible GF(2k) Elliptic Curve Cryptography Coprocessor. Int. Arab J. Inf. Technol. 4(1): 1-10 (2007) - [j3]Adnan Abdul-Aziz Gutub:
High speed hardware architecture to compute galois fields GF(p) montgomery inversion with scalability features. IET Comput. Digit. Tech. 1(4): 389-396 (2007) - [c10]Adnan Abdul-Aziz Gutub, Mohammad K. Ibrahim, Turki F. Al-Somani:
Parallelizing GF(P) elliptic curve cryptography computations for security and speed. ISSPA 2007: 1-4 - [c9]Adnan Abdul-Aziz Gutub, Lahouari Ghouti, Alaaeldin A. Amin, Talal M. Alkharobi, Mohammad K. Ibrahim:
Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking. SECRYPT 2007: 329-332 - 2006
- [j2]Adnan Abdul-Aziz Gutub:
Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers. Int. Arab J. Inf. Technol. 3(4): 342-349 (2006) - [c8]Adnan Abdul-Aziz Gutub, Mohammad K. Ibrahim, Ahmad Kayali:
Pipelining GF(P) Elliptic Curve Cryptography Computation. AICCSA 2006: 93-99 - 2004
- [j1]Adnan Abdul-Aziz Gutub, Alexandre F. Tenca:
Efficient scalable VLSI architecture for Montgomery inversion in GF( p). Integr. 37(2): 103-120 (2004) - 2003
- [c7]Adnan Abdul-Aziz Gutub, Mohammad K. Ibrahim:
Power-time flexible architecture for GF(2k) elliptic curve cryptosystem computation. ACM Great Lakes Symposium on VLSI 2003: 237-240 - [c6]Adnan Abdul-Aziz Gutub, Mohammad K. Ibrahim:
High radix parallel architecture for GF(p) elliptic curve processor. ICASSP (2) 2003: 625-628 - [c5]Adnan Abdul-Aziz Gutub:
Fast elliptic curve cryptographic processor architecture based on three parallel GF(2k) bit level pipelined digit serial multipliers. ICECS 2003: 72-75 - [c4]Adnan Abdul-Aziz Gutub:
VLSI core architecture for GF(p) elliptic curve crypto processor. ICECS 2003: 84-87 - [c3]Adnan Abdul-Aziz Gutub, Mohammad K. Ibrahim:
High performance elliptic curve GF(2k) cryptoprocessor architecture for multimedia. ICME 2003: 81-84 - 2002
- [c2]Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç:
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2). CHES 2002: 484-499 - [c1]Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Çetin Kaya Koç:
Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation. ISVLSI 2002: 53-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint