Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Ahmed Nori"'
Autor:
Omar Abed Najm, Ahmed Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 18, Iss 1, Pp 125-130 (2024)
Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in image Steganography was accomplished to insert a messag
Externí odkaz:
https://doaj.org/article/ee3eeb0899844311b2c3f8b6293a8623
Autor:
Ammar Gharbi, Ahmed Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 16, Iss 1, Pp 1-14 (2022)
From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade and managing their businesses and projects. In this pap
Externí odkaz:
https://doaj.org/article/a0b6c1183e4440d5a4e5dc17ef97475c
Autor:
Mohammed Karem M., Ahmed Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 13, Iss 2, Pp 28-41 (2019)
Steganography is the science/art of hiding information in a way that must not draw attention to the message hidden in the transmitted media, if a suspicion is raised then there is no meaning to the purpose of steganography. Then appeared its counterp
Externí odkaz:
https://doaj.org/article/86258868c30f4013945bbcf50fd8c340
Autor:
Ansam Osamah, Ahmed Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 10, Iss 3, Pp 13-27 (2013)
The present research was aimed to implement a new Steganographic algorithm for Images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure cover for data to be embedded to avoid attention of unauthorized person
Externí odkaz:
https://doaj.org/article/29156dae1eec478fb2c54b543918dc4b
Autor:
Sadoon Abdullah, Ahmed Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 10, Iss 2, Pp 113-134 (2013)
The present study included an application of new method of steganography using DNA sequence as a media for hiding. This method is considered a secret cover for the secret message (text, image), avoid attention of unauthorized person in addition to be
Externí odkaz:
https://doaj.org/article/700eee76bda444649bcb8ecf8a3e64de
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 10, Iss 1, Pp 239-249 (2013)
An improvement to a Steganography method for hiding data using Gray Level Images is proposed in this paper. The method is an improvement over earlier method named Least Significant Bit (LSB). This method uses the 5th, and 6th bits of pixel value for
Externí odkaz:
https://doaj.org/article/a8fe90be9ae34d4ba523b64f0d14e8c5
Autor:
Sadoon Abdullah, Ahmed Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 9, Iss 2, Pp 99-112 (2012)
The present study included an application of new method of steganography using DNA sequence as a medium for hiding. This method is considered as a secret cover for the secret message (text, image), avoid attention of unauthorized person in addition t
Externí odkaz:
https://doaj.org/article/68dd4b40bab742b4803adf9abf19c0fc
Autor:
Samah Aziz, Ahmed Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 8, Iss 2, Pp 151-167 (2011)
With science developing and techniques used in Information hiding, there are another techniques wall together for Steganalysis. Steganography is considered as the new and the complementary system of Cryptography that took a long time in transferring
Externí odkaz:
https://doaj.org/article/74cba16d37ee4ea8b107effbdc3604e8
Autor:
Shyma Mohammed, Ahmed Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 7, Iss 3, Pp 209-226 (2010)
In last years, Steganography techniques involving audio file formats appear to be increasing in popularity. This may be attributed to the fact that current steganalysis tools available to the general public fall short when applied to audio files. Ano
Externí odkaz:
https://doaj.org/article/52a8afe17c8a4f20a2ea0c469d1276a6
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 7, Iss 3, Pp 91-108 (2010)
Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet.In this paper, Least Significant Bit LSB-based Steganograp
Externí odkaz:
https://doaj.org/article/b9fa810994b24cd3b808ff6652dcef20