Zobrazeno 1 - 10
of 113
pro vyhledávání: '"Ziad Alqadi"'
Publikováno v:
IEEE Access, Vol 10, Pp 126304-126314 (2022)
Colored digital images are one of the most important types of digital data to be used in many vital applications, which require a safe way to protect them from hacking operations and the danger of intruders and data thieves. This paper presents an ef
Externí odkaz:
https://doaj.org/article/4169240fe1ca4f9196f545532a919c29
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 4, Iss 1, Pp 40-44 (2020)
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task. I
Externí odkaz:
https://doaj.org/article/d7f3250875744b75bb8e4eb8ce3dc31a
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 4, Iss 1, Pp 10-15 (2020)
Detailed human fingerprints, almost unique, are difficult to change and are permanent on an individual's life, making them suitable as long-term signs of human identity. They may be employed by the police or other authorities to identify individuals
Externí odkaz:
https://doaj.org/article/f454aa89c25448a793faa8a28db68af3
Autor:
Mua’ad Abu-Faraj, Abeer Al-Hyari, Charlie Obimbo, Khaled Aldebei, Ismail Altaharwa, Ziad Alqadi, Orabe Almanaseer
Publikováno v:
Cryptography, Vol 7, Iss 2, p 20 (2023)
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension privat
Externí odkaz:
https://doaj.org/article/d968c1c697b24335bab3d95b323d4b85
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 3, Iss 4, Pp 384-387 (2019)
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method. The ste
Externí odkaz:
https://doaj.org/article/94e22f6f42b94f54876c9d2ec692538a
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 3, Iss 3, Pp 262-265 (2019)
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task. I
Externí odkaz:
https://doaj.org/article/c6b6d86c3ec44d3199561cd8c270efa2
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 3, Iss 2, Pp 94-99 (2019)
Colour image retrieval, identification and recognition play an important role in vital computerized applications, so creating an image signature which can be used as a key to identify the image is an essential and important problem to be solved. In t
Externí odkaz:
https://doaj.org/article/22df8e93cd604ea587837dfa90502dac
Autor:
Ziad AlQadi
Publikováno v:
International Journal of Computer Science and Mobile Computing. 12:32-53
Color digital images are one of the most widespread and widely used types of data, and the image can be secret or of a special nature, or it can be a carrier of confidential data, which makes protecting it very important. In this research, a new meth
Autor:
Ziad Alqadi, Mohammad Al-Raqqad
Publikováno v:
International Journal of Computer Science and Mobile Computing. 12:125-137
A simple and easy to implement method of secret message cryptography will be introduced. The message to be encrypted-decrypted is to be converted to binary matrix, this matrix is to be reshaped to 16 columns matrix, and the contents of this matrix wi
Autor:
Ziad Alqadi
Publikováno v:
International Journal of Computer Science and Mobile Computing. 12:89-100
In this research paper a simple, flexible, secure and efficient method of digital image cryptography will be introduced. The method will enhance some features of standard methods like DES and AES. The introduced method will divide the source data int