-
2
-
-
77954793527
-
Enhancing selective encryption for H.264/AVC using advance encryption standard
-
Abomhara, M., O. Zakaria, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2010b. Enhancing selective encryption for H.264/AVC using advance encryption standard. Int. J. Comput. Electr. Eng., 2: 223-229.
-
(2010)
Int. J. Comput. Electr. Eng.
, vol.2
, pp. 223-229
-
-
Abomhara, M.1
Zakaria, O.2
Khalifa, O.O.3
Zaidan, A.A.4
Zaidan, B.B.5
-
3
-
-
74349117323
-
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
-
Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 59-64
-
-
Ahmed, M.A.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
-
4
-
-
77649155870
-
Arabic text steganography using kashida extensions with huffman code
-
Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 436-439
-
-
Al-Azawi, A.F.1
Fadhil, M.A.2
-
5
-
-
84888285530
-
Code based hashing technique for message authentication algorithms
-
Alghathbar, K., 2010. Code based hashing technique for message authentication algorithms. J. Inform. Assurance Security, 5: 9-20.
-
(2010)
J. Inform. Assurance Security
, vol.5
, pp. 9-20
-
-
Alghathbar, K.1
-
6
-
-
57649151414
-
-
1st Edn., Addis on-Wesley Professional, USA., ISBN-13: 978-0321509178
-
Allen, J., S. Barnum, R. Ellison, G. Mcgraw and N. Mead, 2008. Software Security Engineering: A Guide For Project Managers. 1st Edn., Addis on-Wesley Professional, USA., ISBN-13: 978-0321509178, pp: 368.
-
(2008)
Software Security Engineering: A Guide For Project Managers
, pp. 368
-
-
Allen, J.1
Barnum, S.2
Ellison, R.3
McGraw, G.4
Mead, N.5
-
7
-
-
0003605208
-
-
1st Edn., JohnWilley, UK., ISBN-10: 0471389226
-
Anderson, R.J., 2001. Security Engineering: A Guide to building Dependable Distributed Systems. 1st Edn., JohnWilley, UK., ISBN-10: 0471389226, pp: 640.
-
(2001)
Security Engineering: A Guide to Building Dependable Distributed Systems
, pp. 640
-
-
Anderson, R.J.1
-
8
-
-
84958663551
-
Collision-resistant hashing: Towards making uowhfs practical
-
Bellare, M. and P. Rogaway, 1997. Collision-resistant hashing: Towards making uowhfs practical. Lecture Notes Comput. Sci., 1294: 470-484.
-
(1997)
Lecture Notes Comput. Sci.
, pp. 470-484
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
35048891868
-
Keying hash functions for message authentication
-
Aug. 18-22, Springer-Verlag, Berlin, Germany
-
Bellare, M., R. Canetti and H. Krawczyk, 1996. Keying hash functions for message authentication. Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, Aug. 18-22, Springer-Verlag, Berlin, Germany, pp:l-15.
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
10
-
-
77954808157
-
Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation
-
Jalab, H., A. Zaidan and B.B. Zaidan, 2009. Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation. J. Comput., 1: 108-113.
-
(2009)
J. Comput.
, vol.1
, pp. 108-113
-
-
Jalab, H.1
Zaidan, A.2
Zaidan, B.B.3
-
11
-
-
63349086114
-
Information hiding: Steganography and watermarking-attacks and countermeasures
-
Johnson, N.F., Z. Duric, S. Jajodia and N. Memon, 2001. Information hiding: Steganography and watermarking-attacks and countermeasures. J. Electron. Imag., 10: 825-825.
-
(2001)
J. Electron. Imag.
, vol.10
, pp. 825-825
-
-
Johnson, N.F.1
Duric, Z.2
Jajodia, S.3
Memon, N.4
-
12
-
-
0003482564
-
-
Artech House, UK, ISBN: 1580530354
-
Karzenbeisser, S. and F. Perircolas, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, UK., ISBN: 1580530354, pp: 240.
-
(2000)
Information Hiding Techniques for Steganography and Digital Watermarking
, pp. 240
-
-
Karzenbeisser, S.1
Perircolas, F.2
-
13
-
-
0032634270
-
Principle and applications of BPCS-steganography
-
Kawaguchi, E. and R.O. Eason, 1998. Principle and applications of BPCS-steganography. Proc. SPIE, 3528: 464-473.
-
(1998)
Proc. SPIE
, vol.3528
, pp. 464-473
-
-
Kawaguchi, E.1
Eason, R.O.2
-
15
-
-
77954774232
-
Novel approach for high secure and high rate data hidden in the image using image texture analysis
-
Majeed, A., M.L.M. Kiah, H.T. Madhloom, B.B. Zaidan and A.A. Zaidan, 2009. Novel approach for high secure and high rate data hidden in the image using image texture analysis. Int. J. Eng. Technol., 1: 63-69.
-
(2009)
Int. J. Eng. Technol.
, vol.1
, pp. 63-69
-
-
Majeed, A.1
Kiah, M.L.M.2
Madhloom, H.T.3
Zaidan, B.B.4
Zaidan, A.A.5
-
16
-
-
70449602400
-
Stego-analysis chain, session two novel approach of stego-analysis system for image file
-
April 17-20, Singapore
-
Naji, A.W., S.A. Hameed, M.R. Islam, B.B. Zaidan, T.S. Gunawan and A.A. Zaidan, 2009a. Stego-analysis chain, session two novel approach of stego-analysis system for image file. Proceedings of the International Conference on IACSIT Spring Conference, April 17-20, Singapore, pp: 398-401.
-
(2009)
Proceedings of the International Conference on IACSIT Spring Conference
, pp. 398-340
-
-
Naji, A.W.1
Hameed, S.A.2
Islam, M.R.3
Zaidan, B.B.4
Gunawan, T.S.5
Zaidan, A.A.6
-
17
-
-
77952266986
-
Novel approach of hidden data in the (unused area 2 within exe file) using computation between cryptography and steganography
-
Naji, A.W., A.A. Zaidan, B.B. Zaidan, A. Shihab and O.O. Khalifa, 2009b. Novel approach of hidden data in the (unused area 2 within exe file) using computation between cryptography and steganography. Int. J. Comput. Sci. Network Security, 9: 294-300.
-
(2009)
Int. J. Comput. Sci. Network Security
, vol.9
, pp. 294-300
-
-
Naji, A.W.1
Zaidan, A.A.2
Zaidan, B.B.3
Shihab, A.4
Khalifa, O.O.5
-
18
-
-
70449412512
-
An extensive empirical study for the impact of increasing data hidden on the images texture
-
April 3-5, IEEE Computer Society, Kuala Lumpur, Malysia
-
Othman, F., L. Maktom, A.Y. Taqa, B.B. Zaidan and A.A. Zaidan, 2009. An extensive empirical study for the impact of increasing data hidden on the images texture. Proceedings of the International Conference on Future Computer and Communication, April 3-5, IEEE Computer Society, Kuala Lumpur, Malysia, pp: 477-481.
-
(2009)
Proceedings of the International Conference on Future Computer and Communication
, pp. 477-481
-
-
Othman, F.1
Maktom, L.2
Taqa, A.Y.3
Zaidan, B.B.4
Zaidan, A.A.5
-
20
-
-
67649610454
-
High capacity persian/arabic text steganography
-
Shirah-Shahreza, M. and S. Shirali-Shahreza, 2008. High capacity persian/arabic text steganography. J. Applied Sci., 8: 4173-4179.
-
(2008)
J. Applied Sci.
, vol.8
, pp. 4173-4179
-
-
Shirah-Shahreza, M.1
Shirali-Shahreza, S.2
-
23
-
-
77954780065
-
Novel approach for high secure data hidden in MPEG video using public key infrastructure
-
Zaidan, A. and B. Zaidan, 2009. Novel approach for high secure data hidden in MPEG video using public key infrastructure. Int. J. Comput. Network Security, 1: 1985-1993.
-
(2009)
Int. J. Comput. Network Security
, vol.1
, pp. 1985-1993
-
-
Zaidan, A.1
Zaidan, B.2
|