Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Yasir Ahmed Hamza"'
Publikováno v:
Baghdad Science Journal, Vol 19, Iss 1 (2022)
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such
Externí odkaz:
https://doaj.org/article/5efcb8f9990f484cab54a05e56ee34bc
Publikováno v:
2020 International Conference on Computer Science and Software Engineering (CSASE).
In this paper, a new method of secured reversible data hiding that depends on modified pixel expansion has been proposed. The coloured image is divided into three layers (red, green, and blue); then, the blue-layer will be selected as a cover-media f
Publikováno v:
Baghdad Science Journal, Vol 19, Iss 1 (2022)
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such
Autor:
Renas R. Asaad, Yasir Ahmed Hamza
Publikováno v:
Academic Journal of Nawroz University. 6:112-123
Digital images can be changed easily nowadays through the use of sophisticated software to edit images such as (Adobe Photoshop®). You can look at some manipulated pictures along the lines of the original images without any suspicion that they are a
Autor:
Yasir Ahmed Hamza
Publikováno v:
Proceedings of the International Conference on Information and Communication Technology.
Media (image, text, sound, and video) becomes available in the digital form. The ability to copy or modify contents and access to these media easily lead to making these problems challenging when transferring them to the internet. Therefore, data hid
Autor:
Yasir Ahmed Hamza, Marwan Dahar Omer
Publikováno v:
Academic Journal of Nawroz University. 10:11
In this study, a new approach of image encryption has been proposed. This method is depends on the symmetric encryption algorithm RC4 and Rossler chaotic system. Firstly, the encryption key is employed to ciphering a plain image using RC4 and obtains
Autor:
Yasir Ahmed Hamza
Publikováno v:
IOSR Journal of Computer Engineering. 12:60-65
The increased use of internet communication has given rise to the field of image steganography and made it necessary to secure digital content. Current image steganography techniques lack novelty and are based on using traditional cryptography soluti
Autor:
Marwan Omar, Yasir Ahmed Hamza
The focus of this chapter is to highlight and address security challenges associated with the use and adoption of cloud computing. The chapter will describe how cloud computing has become an emerging and promising computing model that provides on-dem
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::37435b3732fa4dd806d5accf28075750
https://doi.org/10.4018/978-1-4666-8387-7.ch002
https://doi.org/10.4018/978-1-4666-8387-7.ch002