Zobrazeno 1 - 10
of 89
pro vyhledávání: '"Abdul Monem S. Rahma"'
Publikováno v:
IEEE Access, Vol 12, Pp 13900-13911 (2024)
The use of watermarking techniques, which incorporate invisible information into multimedia files, is crucial for securing digital content. Watermarking research still faces difficulties in striking a balance between speed, robustness, and impercepti
Externí odkaz:
https://doaj.org/article/9b48e9adc267473da6455c153f10a0b5
Publikováno v:
Ibn Al-Haitham Journal for Pure and Applied Sciences, Vol 37, Iss 2 (2024)
While transmitting data across a network, it is important to keep in mind that some fields may contain sensitive information. One of the most pressing concerns, then, is the protection of private information. The confidentiality and integrity of an o
Externí odkaz:
https://doaj.org/article/cd110737a523430f950f1168b6c7a676
Publikováno v:
Wasit Journal of Computer and Mathematics Science, Vol 2, Iss 3 (2023)
This study offers a new adjustment to the Advanced Encryption Standard (AES) in order to assure a high degree of security. This is achieved by replacing the binary (XOR) operation with a new (Xo) operation in each add-round-key stage. The Xo operatio
Externí odkaz:
https://doaj.org/article/aefcdd6b223f46a8bbd63717acb2a36d
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 8, Pp 101716- (2023)
One of the most commonly used symmetric encryption methods is the Data Encryption Standard (DES), but it has a number of flaws. For instance, the encryption method only employs two functions (XOR), acts on one bit, and only allows for a finite number
Externí odkaz:
https://doaj.org/article/9ec58093f6084102bd4ebcd9ea913ea1
Publikováno v:
Engineering and Technology Journal, Vol 39, Iss 1B, Pp 117-128 (2021)
Robust facial feature extraction is an effective and important process for face recognition and identification system. The facial features should be invariant to scaling, translation, illumination and rotation, several feature extraction techniques m
Externí odkaz:
https://doaj.org/article/03b031c96bf54c4e8579e7ce84f15c50
Autor:
Abdul Monem S. Rahma, Nabaa Basil Abd
Publikováno v:
Ibn Al-Haitham Journal for Pure and Applied Sciences, Vol 32, Iss 2 (2019)
Detection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to
Externí odkaz:
https://doaj.org/article/3d4758e0928c48d3a81bde2f0c74c497
Publikováno v:
Engineering and Technology Journal, Vol 33, Iss 8B, Pp 1430-1444 (2015)
The cubic spline interpolation method is used to design the developed curve. The method enables the designer to change the shape of the curve to the desired one without changing the original data points. That done by changing the value of the paramet
Externí odkaz:
https://doaj.org/article/399a370d69e841b9bbc1b76b252a76d0
Publikováno v:
Engineering and Technology Journal, Vol 32, Iss 2B, Pp 302-312 (2014)
The main characteristic of adaptive filters is that it alters its basic behavior as the image is processed, so it can remove noise from images regions as well as preserving edge and details information. The objective of this work is to combine the st
Externí odkaz:
https://doaj.org/article/8f1c3bd38327498dbd1f51a19c1c76c5
Publikováno v:
Engineering and Technology Journal, Vol 31, Iss 2 B, Pp 239-251 (2013)
Noise is any undesired information that contaminates an image. The ideal situation (no noise) never occurs in practice, so there is a little point in ignoring it. Hence, one of the primary concerns of digital image processing is to increase image qua
Externí odkaz:
https://doaj.org/article/1b5d702dc16f429fb02469d068446142
Publikováno v:
مجلة جامعة الانبار للعلوم الصرفة, Vol 5, Iss 3, Pp 45-49 (2012)
The Aim of this paper is to design a protocol for key exchanging to work on the available computers for different data security application. This paper proposed idea to modify the Diffie-Hellman key exchange by using truncated polynomial instead of d
Externí odkaz:
https://doaj.org/article/e501f205d1e64b728e248ef6fb04609b