• Publications
  • Influence
Digital image steganography: Survey and analysis of current methods
This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism. Expand
A Survey of Geographical Routing in Wireless Ad-Hoc Networks
This paper aims to provide both a comprehensive and methodical survey of existing literature in the area of geographic routing from its inception as well as acting as an introduction to the subject. Expand
A survey of active and passive indoor localisation systems
This paper is a survey of various active and passive localisation techniques developed over the years, comparing various systems presenting their advantages and disadvantages. Expand
An evaluation of image based steganography methods
The initial aim of this study was to investigate steganography and how it is implemented and a number of common methods of Steganography could be implemented and evaluated. Expand
A skin tone detection algorithm for an adaptive approach to steganography
A new colour space is used which contains error signals derived from differentiating the grayscale map and the non-red encodedgrayscale version to show that luminance can be useful in the segregation of skin and non-skin clusters. Expand
Taking the information to the public through Library 2.0
This paper seeks to present an overview of Library 2.0, a one‐directional service that takes people to the information that they require by bringing the library service to the internet and getting the users more involved by encouraging feedback participation. Expand
An evaluation of indoor location determination technologies
This article attempts to provide a useful comparison of commercial systems on the market with regard to informing IT departments as to their performance in various aspects which are important to tracking devices and people in relatively confined areas by providing a review of the practicalities of installing certain location-sensing systems. Expand
Biometric Inspired Digital Image Steganography
This paper proposes using human skin tone detection in colour images to form an adaptive context for an edge operator which will provide an excellent secure location for data hiding. Expand
Cognitive Radio
Cognitive radio can monitor, observe, and react to events in a specified environment, and can achieve a performance that is close to a licensed band even when using an unlicensed band due primarily to its inherent ability to switch to best channels. Expand