-
1
-
-
77954808901
-
Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
-
Abomhara M, Khalifa OO, Zakaria O, Zaidan AA, Zaidan BB, Alanazi HO (2010). Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview. J. Appl. Sci., 10(15): 1656-1661.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.15
, pp. 1656-1661
-
-
Abomhara, M.1
Khalifa, O.O.2
Zakaria, O.3
Zaidan, A.A.4
Zaidan, B.B.5
Alanazi, H.O.6
-
2
-
-
74349117323
-
A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm
-
Ahmed MA, Kiah MLM, Zaidan BB, Zaidan AA (2010). A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. J. Appl. Sci., 10(1): 59-64.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.1
, pp. 59-64
-
-
Ahmed, M.A.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
-
3
-
-
78049468900
-
Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance
-
Alanazi HO, Jalab HA, Zaidan BB, Zaidan AA, Alam, Gazi M (2010). Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance. J. Medicinal Plants Res., 4(19): 2059-2074.
-
(2010)
J. Medicinal Plants Res
, vol.4
, Issue.19
, pp. 2059-2074
-
-
Alanazi, H.O.1
Jalab, H.A.2
Zaidan, B.B.3
Zaidan, A.A.4
Alam5
Gazi, M.6
-
4
-
-
77954800078
-
Hiding Data in Video File: An Overview
-
Al-Frajat AK, Jalab HA, Kasirun ZM, Zaidan AA, Zaidan BB (2010). Hiding Data in Video File: An Overview. J. Appl. Sci., 10(15): 1644-1649.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.15
, pp. 1644-1649
-
-
Al-Frajat, A.K.1
Jalab, H.A.2
Kasirun, Z.M.3
Zaidan, A.A.4
Zaidan, B.B.5
-
6
-
-
77953709219
-
A soft computing approach for modeling of severity of faults in software systems
-
Ardil E, Sandhu PS (2010). A soft computing approach for modeling of severity of faults in software systems. Int. J. Phys. Sci., 5(2): 074-085.
-
(2010)
Int. J. Phys. Sci
, vol.5
, Issue.2
, pp. 074-085
-
-
Ardil, E.1
Sandhu, P.S.2
-
7
-
-
84857780639
-
Adoption of tax e-filing: A conceptual paper
-
Azmi AAC, Kamarulzaman Y (2010). Adoption of tax e-filing: A conceptual paper. Afr. J. Bus. Manage., 4(5): 599-603.
-
(2010)
Afr. J. Bus. Manage
, vol.4
, Issue.5
, pp. 599-603
-
-
Azmi, A.A.C.1
Kamarulzaman, Y.2
-
8
-
-
77953508901
-
Performance of ANN in determination of unstable points in leveling networks
-
Celik CT (2010). Performance of ANN in determination of unstable points in leveling networks. Int. J. Phys. Sci., 5(5): 401-407.
-
(2010)
Int. J. Phys. Sci
, vol.5
, Issue.5
, pp. 401-407
-
-
Celik, C.T.1
-
9
-
-
78649315073
-
-
8th International Student Conference on Electrical Engineering
-
Dobsicek M (2004). Extended steganographic system. 8th International Student Conference on Electrical Engineering.
-
(2004)
Extended Steganographic System
-
-
Dobsicek, M.1
-
10
-
-
44949249676
-
Hiding a Large Amount of Data with High Security Using Steganography Algorithm
-
EL-Emam NN (2007). Hiding a Large Amount of Data with High Security Using Steganography Algorithm J. Comput. Sci., 4(3): 223-232.
-
(2007)
J. Comput. Sci
, vol.4
, Issue.3
, pp. 223-232
-
-
El-Emam, N.N.1
-
13
-
-
0001935107
-
What's wrong with mean-squared error? Digital images and human vision
-
Girod B (1993). What's wrong with mean-squared error? Digital images and human vision, MIT Press, pp. 207-220.
-
(1993)
MIT Press
, pp. 207-220
-
-
Girod, B.1
-
14
-
-
77949295218
-
Outlier detection for geodetic nets using ADALINE learning algorithm
-
Gullu M, Yilmaz I (2010). Outlier detection for geodetic nets using ADALINE learning algorithm. Sci. Res. Essays, 5(5): 440-447.
-
(2010)
Sci. Res. Essays
, vol.5
, Issue.5
, pp. 440-447
-
-
Gullu, M.1
Yilmaz, I.2
-
15
-
-
77954499630
-
Information and communication technology for participatory based decision-making-E-management for administrative efficiency in Higher Education
-
Hashim F, Alam GM, Siraj S (2010). Information and communication technology for participatory based decision-making-E-management for administrative efficiency in Higher Education. Int. J. Phys. Sci., 5(4): 383-392.
-
(2010)
Int. J. Phys. Sci
, vol.5
, Issue.4
, pp. 383-392
-
-
Hashim, F.1
Alam, G.M.2
Siraj, S.3
-
16
-
-
77954824252
-
On the capacity and security of steganography approaches: An overview
-
Hmood AK, Jalab HA, Kasirun ZM, Zaidan BB, Zaidan AA (2010b). On the capacity and security of steganography approaches: An overview." J. Appl. Sci., 10(16): 1825-1833.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.16
, pp. 1825-1833
-
-
Hmood, A.K.1
Jalab, H.A.2
Kasirun, Z.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
17
-
-
77958064851
-
On the Accuracy of Hiding Information Metrics: Counterfeit protection for education and important certificates
-
Hmood AK, Kasirun ZM, Jalab HA, Zaidan AA, Zaidan BB, Alam GM (2010c). On the Accuracy of Hiding Information Metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci.,
-
(2010)
Int. J. Phys. Sci
-
-
Hmood, A.K.1
Kasirun, Z.M.2
Jalab, H.A.3
Zaidan, A.A.4
Zaidan, B.B.5
Alam, G.M.6
-
18
-
-
77954829600
-
An overview on hiding information technique in images
-
Hmood AK, Zaidan BB, Zaidan AA, Jalab HA (2010a). An overview on hiding information technique in images. J. Appl. Sci., 10(18): 2094-2100.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.18
, pp. 2094-2100
-
-
Hmood, A.K.1
Zaidan, B.B.2
Zaidan, A.A.3
Jalab, H.A.4
-
19
-
-
67650680126
-
The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaptation in the context of electronic banking
-
Jahangir N, Begum N (2008). The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaptation in the context of electronic banking. Afri. J. Bus. Manage., 2(1): 032-040.
-
(2008)
Afri. J. Bus. Manage
, vol.2
, Issue.1
, pp. 032-040
-
-
Jahangir, N.1
Begum, N.2
-
20
-
-
78649240477
-
Research on false color image composite and enhancement methods based on ratio images
-
Juna L, Songweic C, Duanyoua L, Bina W, Shuod L, Liminga Z. (2008). Research on false color image composite and enhancement methods based on ratio images. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences. XXXVII(Part B7).
-
(2008)
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
, vol.XXXVII
, Issue.PART B7
-
-
Juna, L.1
Songweic, C.2
Duanyoua, L.3
Bina, W.4
Shuod, L.5
Liminga, Z.6
-
21
-
-
70350050538
-
Adaptive lifting based image compression scheme for narrow band transmission system
-
Kanvel N, Monie EC (2009). Adaptive lifting based image compression scheme for narrow band transmission system. Int. J. Phys. Sci., 4(4): 194-164.
-
(2009)
Int. J. Phys. Sci
, vol.4
, Issue.4
, pp. 194-164
-
-
Kanvel, N.1
Monie, E.C.2
-
22
-
-
33748607491
-
Objective video quality assessment
-
Lee C, Cho S, Choe J, Jeong T, Ahn W, Lee E (2006). Objective video quality assessment. Optical engineering, 45: 017004.
-
(2006)
Optical Engineering
, vol.45
, pp. 017004
-
-
Lee, C.1
Cho, S.2
Choe, J.3
Jeong, T.4
Ahn, W.5
Lee, E.6
-
24
-
-
84857781088
-
An empirical study of on-line tax filing acceptance model: Integrating TAM and TPB
-
Lu CT, Huang SY, Lo PY (2010). An empirical study of on-line tax filing acceptance model: Integrating TAM and TPB. Afr. J. Bus. Manage., 4(5): 800-810.
-
(2010)
Afr. J. Bus. Manage
, vol.4
, Issue.5
, pp. 800-810
-
-
Lu, C.T.1
Huang, S.Y.2
Lo, P.Y.3
-
25
-
-
0036566725
-
Hybrid digital-analog (HDA) joint source-channel codes for broadcasting and robust communications
-
Mittal U, Phamdo N (2002). Hybrid digital-analog (HDA) joint source-channel codes for broadcasting and robust communications. IEEE Transactions on Information Theory, 48(5).
-
(2002)
IEEE Transactions On Information Theory
, vol.48
, Issue.5
-
-
Mittal, U.1
Phamdo, N.2
-
26
-
-
84857780525
-
E-commerce and legal protection for consumers: Spanish analysis
-
Mondéjar J, Juan A, Mondéjar JJ, Ángeles M, Zurilla C (2009). E-commerce and legal protection for consumers: Spanish analysis. Afr. J. Bus. Manage., 3(9): 426-432.
-
(2009)
Afr. J. Bus. Manage
, vol.3
, Issue.9
, pp. 426-432
-
-
Mondéjar, J.1
Juan, A.2
Mondéjar, J.J.3
Ángeles, M.4
Zurilla, C.5
-
27
-
-
77952268534
-
Challenges of Hidden Data in the Unused Area Two within Executable Files
-
Naji AW, Zaidan AA, Zaidan BB (2009). Challenges of Hidden Data in the Unused Area Two within Executable Files. J. Comput. Sci., 5(11): 890-897.
-
(2009)
J. Comput. Sci
, vol.5
, Issue.11
, pp. 890-897
-
-
Naji, A.W.1
Zaidan, A.A.2
Zaidan, B.B.3
-
30
-
-
63649141397
-
Hiding data in DNA
-
Shimanovsky B, Feng J, Potkonjak M Eds., Heidelberg, Springer
-
Shimanovsky B, Feng J, Potkonjak M Eds. (2003). Hiding data in DNA. Information Hiding. Heidelberg, Springer.
-
(2003)
Information Hiding
-
-
-
32
-
-
78649259743
-
-
Information Security and Data Breach Notification Safeguards, Library of Congress Washington DC Congressional Research Service
-
Stevens GM, Attorney L (2007). Information Security and Data Breach Notification Safeguards, Library of Congress Washington DC Congressional Research Service.
-
(2007)
-
-
Stevens, G.M.1
Attorney, L.2
-
33
-
-
77953587765
-
Application of Neural Network models on analysis of prismatic structures
-
Tayi N (2010). Application of Neural Network models on analysis of prismatic structures. Sci. Res. Essays, 5(9): 978-989.
-
(2010)
Sci. Res. Essays
, vol.5
, Issue.9
, pp. 978-989
-
-
Tayi, N.1
-
35
-
-
0032657829
-
Spatial filter selection for illumination-invariant color texture discrimination
-
Thai B, Healey G (1999). Spatial filter selection for illumination-invariant color texture discrimination. Computer Vision and Pattern Recognition, 2(6): 23-06.
-
(1999)
Computer Vision and Pattern Recognition
, vol.2
, Issue.6
, pp. 23-06
-
-
Thai, B.1
Healey, G.2
-
37
-
-
8644245233
-
Unifying statistical texture classification frameworks
-
Varma M (2004). Unifying statistical texture classification frameworks. Image and Vision Computing, 22: 1175-1183.
-
(2004)
Image and Vision Computing
, vol.22
, pp. 1175-1183
-
-
Varma, M.1
-
40
-
-
0036288342
-
Why is image quality assessment so difficult?
-
Wang Z, Bovik AC, Lu L (2002a). Why is image quality assessment so difficult?, IEEE; 1999.
-
(2002)
IEEE
, pp. 1999
-
-
Wang, Z.1
Bovik, A.C.2
Lu, L.3
-
41
-
-
0348170824
-
Video quality assessment based on structural distortion measurement
-
Wang Z, Lu L, Bovik AC (2004). Video quality assessment based on structural distortion measurement. Signal processing: Image communication 19(2): 121-132.
-
(2004)
Signal Processing: Image Communication
, vol.19
, Issue.2
, pp. 121-132
-
-
Wang, Z.1
Lu, L.2
Bovik, A.C.3
-
43
-
-
77954755662
-
A novel 3D spatial neighbor points coupling surface modeling method for scattered points
-
Xu H, Hu Y, Chen Y (2010). A novel 3D spatial neighbor points coupling surface modeling method for scattered points. Int. J. Phys. Sci., 5(4): 313-320.
-
(2010)
Int. J. Phys. Sci
, vol.5
, Issue.4
, pp. 313-320
-
-
Xu, H.1
Hu, Y.2
Chen, Y.3
-
44
-
-
77957325769
-
Novel Approach for High (Secure and Rate) Data Hidden within Triplex Space for Executable File
-
Zaidan AA, Zaidan BB, Alanazi OH, Gani A, Zakaria O, Alam GM (2010a). Novel Approach for High (Secure and Rate) Data Hidden within Triplex Space for Executable File. Sci. Res. Essays.
-
(2010)
Sci. Res. Essays
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Alanazi, O.H.3
Gani, A.4
Zakaria, O.5
Alam, G.M.6
-
45
-
-
77954826595
-
Investigate the Capability of Applying Hidden Data in Text File: An Overview
-
Zaidan AA, Zaidan BB, Al-Fraja AK, Jalab HA (2010b). Investigate the Capability of Applying Hidden Data in Text File: An Overview. J. Appl. Sci., 10(17): 1916-1922.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.17
, pp. 1916-1922
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Al-Fraja, A.K.3
Jalab, H.A.4
-
46
-
-
77954833269
-
An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael
-
Zaidan AA, Zaidan BB, Al-Frajat AK, Jalab HA (2010c). An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael. J. Appl. Sci., 10(18): 2161-2167.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.18
, pp. 2161-2167
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Al-Frajat, A.K.3
Jalab, H.A.4
-
47
-
-
77954783981
-
On the Differences between Hiding Information and Cryptography Techniques: An Overview
-
Zaidan BB, Zaidan AA, Al-Frajat AK, Jalab HA (2010d). On the Differences between Hiding Information and Cryptography Techniques: An Overview. J. Appl. Sci., 10(15): 1650-1655.
-
(2010)
J. Appl. Sci
, vol.10
, Issue.15
, pp. 1650-1655
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Al-Frajat, A.K.3
Jalab, H.A.4
-
48
-
-
77958518850
-
Stego-Image Vs Stego-Analysis System
-
Zaidan BB, Zaidan AA, Taqa A, Othman F (2009). Stego-Image Vs Stego-Analysis System. Int. J. Eng. Technol. (IJET), 1(5): 596-602.
-
(2009)
Int. J. Eng. Technol. (IJET)
, vol.1
, Issue.5
, pp. 596-602
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Taqa, A.3
Othman, F.4
|