Asst. Prof. Dr. Mary AGOYI

CURRICULUM VITAE

  • 1. Rasti, P., Samiei, S., Agoyi, M., Escalera, S., & Anbarjafari, G. (2016). Robust non-blind color video watermarking using QR decomposition and entropy analysis. Journal of Visual Communication and Image Representation, 38, 838-847.
  • 2. Laur, Lauri, Pejman Rasti, Mary Agoyi, and Gholamreza Anbarjafari. 'A Robust Color Image Watermarking Scheme Using Entropy and QR Decomposition.", Radioengineering Vol. 24, No. 4, 2015
  • 3. Mary Agoyi., Erbuğ Çelebi., and G.holemreza Anbarjafari, A Watermarking Algorithm Based on Chirp Z-Transform, Discrete Wavelet Transform, and Singular Value Decomposition', Signal ,image and video processing Journal, Vol. 9, Is. 3 , 2014, pp 735-745
  • 1. Laur, Lauri, Morteza Daneshmand, Mary Agoyi, and Gholamreza Anbarjafari. "Robust grayscale watermarking technique based on face detection." 23th IEEE Signal Processing and Communications Applications Conference, Turkey 2015, pp. 471-475., 2015.
  • 2. Mary Agoyi and Devrim Seral. 'An Imperceptible Watermarking Scheme based on Double Density Dual-Tree Discrete Wavelet Transform in combination with Singular Value Decomposition', 5th International Conference on Information Security and Cryptology, Ankara, Turkey, 2012, pp 218-223
  • 3. Mary Agoyi and Devrim Seral. 'Çift Yoğunluklu Çifte-Ağaç Ayrık Dalgacık Dönüşüm ve Tekil Değer Ayrışım Temelli Çoğul Ortam Gizli Damgalama Tasarımı', 20th Signal Processing and Communications Applications Conference. Turkey , 2012
  • 4. Mary Agoyi and Devrim Seral. 'The use of SMS Encrypted Message to Secure Automatic Teller Machine,' World Conference on Information Technology (WCIT 2010), Procedia Computer Science, Istanbul, Turkey, Oct. 2010, vol. 3, pp. 1310-1314, 2011.
  • 5. Mary Agoyi and Devrim Seral. 'Processing Speed: A Factor in SMS Security,' The 6th International Symposium on Electrical and Electronics Engineering and Computer Systems (EEECS 2010), Lefke, North Cyprus, Nov. 2010, pp. 159-163.
  • 6. Mary Agoyi and Devrim Seral. 'SMS Security: An Asymmetric Encryption Approach,' The 6th International Conference on Wireless and Mobile Communications (ICWMC 2010), Valencia, Spain, Sep. 2010, pp. 448-452
  • 7. Idoga, Patience E., Mary Agoyi, Elizabeth Y. Coker-Farrell, and Ogazi L. Ekeoma. "Review of security issues in e-Healthcare and solutions." In HONET-ICT, 2016, pp. 118-121. IEEE, 2016.
  • 8. Omar Abodena, Mary Agoyi, Erbug Celebi, Hybrid technique for robust image watermarking using discrete time fourier transform,25th Signal Processing and Communications Applications Conference (SIU),pp 1-4, 2017
  • 1. Mary Agoyi, Erbug Celebi and Gholamreza Anbarjafari, 'Digital, Image Watermarking: Chirp Z Approach'. Germany: LAP LAMBERT Academic Publishing, 2015
  • Anthony T. Eniayejuni, Mary Agoyi, 'A Biometrics Approach to Population Census and National Identification in Nigeria: A Prerequisite for Planning and Development', Journal of Asian Transaction on basic and applied science(ATBAS), Vol 01, No. 5, Nov. 2011, pp. 60- 67
  • 1. Lauri Laur, Entropy Based Robust Watermarking Algorithm, co-supervised with Gholamreza Anbarjafari,University Of Tartu, 2015
  • 2. Amina Lawal, E-Learning Cloud System: A Proposed Solution to the Adoption of E-Learning System in Katsina State Tertiary Institutions,
2016
  • 3. Samuel Adeyefa, Evaluating the Awareness of Computer Ethics among the University Students: A case of Cyprus International University, 2016
  • 4. Terfa Nomwhange , Impact and Challenges of the Use of Information Systems in Financial Transactions: A Case Study of North Cyprus Banks, 2016
  • 5. Huzaifa Bashir Turaki, A novel watermarking algorithm based on DWT-CZT-QR Decomposition, 2016
  • 6. Farah Qasim Almed Alyousuf, Enhancing data security in cloud computing with 3XAES, 2016
  • 7. Raymond Aigbe, master Thesis, Securing Mobile Messaging on Android, 2016
  • 8. Aishatu Saidu Diri Lawal, Privacy & security issues of personal information sharing on Facebook. A case of CIU, 2017
  • 9. Olivier K.Kadiata,Cryptography Application of Instant Messaging for E-Banking Security, 2017
  • 10. Mabruka algherinai, A Comparative Analysis of Asymmetric encryption schemes on Android Messaging Service, 2017
  • 11. Ibrahim Waziri Ahmad, E- Health Adoption and Challenges: A Case a of Northern Nigeria Hospitals, 2017
  • 12. Maduku Tinovimbanashe, Privacy and Security Issues Affecting the Adoption and Usage of E-Commerce Sites, 2017
  • 13. Kudirat O. Mustapha, Comparative Analysis of Plagiarism Detection Tools, 2017
  • 14. Victor Samuel Zirawaga, Social Media: An Academic Learning Tool: A Case of CIU, 2017
  • 15. Shamsudeen Bashir Ojuade, A Hybrid Watermarking Algorithm based on DWT-FFT-QR-SVD, 2017
  • 16. Hamed Ali, Computer Ethical issues in Workplace: A Case of Libya Telecommunication Company, 2017
  • 17. Hamza Abushhiwa, Benefit and Usage of Information Technology in University of Tripoliin Tripoli , 2017
  • Omar Moftah Ibrahim Abodena, Robust Audio Watermarking Scheme using DTTF-DWT-SVD (ongoing)
  • Information Security