Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Maisa'a. Abid Ali Khodher"'
Publikováno v:
Journal of Engineering and Applied Science, Vol 70, Iss 1, Pp 1-21 (2023)
Abstract DNA has recently been investigated as a possible medium concerning ultra-compact information storage and ultra-scale computation. The development of secure image encryption systems has recently received a certain effective and new direction
Externí odkaz:
https://doaj.org/article/d04d3349e807440d9922a013e4d6a258
Publikováno v:
Computers, Materials & Continua. 75:2137-2153
Over the last twenty years, chaos-based encryption has been an increasingly popular way to encrypt and decrypt data using nonlinear dynamics and deterministic chaos. Discrete chaotic systems based on iterative maps have gotten a lot of interest becau
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2659::4ecc3c1ff0ed860540e0d0ac364aa237
https://zenodo.org/record/7869585
https://zenodo.org/record/7869585
Publikováno v:
2022 International Conference on Data Science and Intelligent Computing (ICDSIC).
Autor:
Maisa'a Abid Ali Khodher1 110044@uotechnology.edu.iq
Publikováno v:
Iraqi Journal of Science. 2018, Vol. 59 Issue 2B, p922-933. 12p.
Publikováno v:
Journal of Physics: Conference Series. 1963:012098
The objective of this paper is steganography of data in images, after transform this image in any manner. Because in present to increases of social media, and internet and web networks. Therefore, it can need data security during transmit between sen
Publikováno v:
2019 2nd Scientific Conference of Computer Sciences (SCCS).
An analysis system of automatic training for gymnastics for you this very important for individuals in freehand gymnastics. Assessment of the strength of youths for kinetic gymnastics is very important for performance. This paper suggests an analytic
Publikováno v:
Journal of Physics: Conference Series. 1897:012025
Datum embedding or information hiding is a method that accepted us to secret embedded and extracted data from any file, such as picture file, a video file, and sound file. The base algorithm in steganography is the embedded and extraction algorithms.
Publikováno v:
International Journal of Computing and Information Sciences. 12:243-251
Publikováno v:
Journal of Physics: Conference Series. 1591:012024
The steganography is branch from information hiding, the speed of evolve communications Internet and networks in wide areas in the world. This evolve make to most people tends for work in security data through transmit across networks from sender to