Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Ahmed S. Nori"'
Autor:
Ahmed S. Nori, Ansam O. Abdulmajeed
Publikováno v:
Sustainable Engineering and Innovation, Vol 3, Iss 2, Pp 79-91 (2021)
This paper is presenting design and implementation of Threefish block cipher on grayscale images. Despite the fact that Threefish block cipher is one of the best secure algorithms, most studies concerning Threefish have focused on hardware implementa
Externí odkaz:
https://doaj.org/article/f1b79fb5c87b4a1eb9be5f149bf8143d
Autor:
Shatha A. Baker, Ahmed S. Nori
Publikováno v:
NTU Journal of Pure Sciences. 1:10-21
In recent years, different encryption lightweight algorithms have been suggested to protect the security of data transferred across the IoT network. The symmetric key ciphers play a significant role in the security of devices, in particular block cip
Publikováno v:
Sustainable Engineering and Innovation, Vol 3, Iss 2, Pp 79-91 (2021)
This paper is presenting design and implementation of Threefish block cipher on grayscale images. Despite the fact that Threefish block cipher is one of the best secure algorithms, most studies concerning Threefish have focused on hardware implementa
Autor:
A M Mohammed Karem, Ahmed S. Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 13, Iss 2, Pp 28-41 (2019)
Steganography is the science/art of hiding information in a way that must not draw attention to the message hidden in the transmitted media, if a suspicion is raised then there is no meaning to the purpose of steganography. Then appeared its counterp
Publikováno v:
Journal of Physics: Conference Series. 1804:012144
In recent years hand geometric dependent biometric system has shown to be the quite acceptable biometric trait and suitable for security applications. It has been recognized as an effective means of authenticating identity in a variety of commercial
Autor:
Ahmed S. Nori, Ansam Osamah
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 10, Iss 3, Pp 13-27 (2013)
The present research was aimed to implement a new Steganographic algorithm for Images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure cover for data to be embedded to avoid attention of unauthorized person
Autor:
Ahmed S. Nori, Sadoon Hussein Abdullah
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 10, Iss 2, Pp 113-134 (2013)
The present study included an application of new method of steganography using DNA sequence as a media for hiding. This method is considered a secret cover for the secret message (text, image), avoid attention of unauthorized person in addition to be
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 10, Iss 1, Pp 239-249 (2013)
An improvement to a Steganography method for hiding data using Gray Level Images is proposed in this paper. The method is an improvement over earlier method named Least Significant Bit (LSB). This method uses the 5th, and 6th bits of pixel value for
Autor:
Sadoon Hussein Abdullah, Ahmed S. Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 9, Iss 2, Pp 99-112 (2012)
The present study included an application of new method of steganography using DNA sequence as a medium for hiding. This method is considered as a secret cover for the secret message (text, image), avoid attention of unauthorized person in addition t
Autor:
Samah F. Aziz, Ahmed S. Nori
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 8, Iss 2, Pp 151-167 (2011)
With science developing and techniques used in Information hiding, there are another techniques wall together for Steganalysis. Steganography is considered as the new and the complementary system of Cryptography that took a long time in transferring