-
1
-
-
77954808901
-
Overview: Suitability of using symmetric key to secure multimedia data
-
Abomhara, M., O. Zakaria, O.O. Khalifa, A.A. Zaidan, B.B. Zaidan and O.A. Hamdan, 2010a. Overview: Suitability of using symmetric key to secure multimedia data. J. Applied Sci., 10: 1656-1661.
-
(2010)
J. Applied Sci
, vol.10
, pp. 1656-1661
-
-
Abomhara, M.1
Zakaria, O.2
Khalifa, O.O.3
Zaidan, A.A.4
Zaidan, B.B.5
Hamdan, O.A.6
-
2
-
-
77954822380
-
Video compression techniques: An overview
-
Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and A. Rame, 2010b. Video compression techniques: An overview. J. Applied Sci., 10: 1834-1840.
-
(2010)
J. Applied Sci
, vol.10
, pp. 1834-1840
-
-
Abomhara, M.1
Khalifa, O.O.2
Zakaria, O.3
Zaidan, A.A.4
Zaidan, B.B.5
Rame, A.6
-
3
-
-
74349117323
-
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
-
Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
-
(2010)
J. Applied Sci
, vol.10
, pp. 59-64
-
-
Ahmed, M.A.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
-
4
-
-
78650590292
-
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
-
Al-Bakri, S.H. and M.L.M. Kiah, 2010. A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Sci. Res. Essays
-
(2010)
Sci. Res. Essays
-
-
Al-Bakri, S.H.1
Kiah, M.L.M.2
-
5
-
-
77954800078
-
Hiding data in video file: An overview
-
Al-Frajat A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
-
(2010)
J. Applied Sci
, vol.10
, pp. 1644-1649
-
-
Al-Frajat, A.K.1
Jalab, H.A.2
Kasirun, Z.M.3
Zaidan, A.A.4
Zaidan, B.B.5
-
6
-
-
78951479954
-
Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
-
Alam, G.M., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and H.O. Alanazi, 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Sci. Res. Essays, 5: 3254-3260.
-
(2010)
Sci. Res Essays
, vol.5
, pp. 3254-3260
-
-
Alam, G.M.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
Alanazi, H.O.5
-
7
-
-
78049468900
-
Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
-
Alanazi, H.O., H.A. Jalab, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
-
(2010)
J. Med. Plants Res
, vol.4
, pp. 2059-2074
-
-
Alanazi, H.O.1
Jalab, H.A.2
Alam, G.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
8
-
-
0036394536
-
Electronic signature for medical documents-integration and evaluation of a public key infrastructure in hospitals
-
Brandner, R., M. van der Haak, M. Hartmann, R. Haux and P. Schmucker, 2002. Electronic signature for medical documents-integration and evaluation of a public key infrastructure in hospitals. Methods Inform. Med., 41: 321-330.
-
(2002)
Methods Inform Med
, vol.41
, pp. 321-330
-
-
Brandner, R.1
van der Haak, M.2
Hartmann, M.3
Haux, R.4
Schmucker, P.5
-
9
-
-
0031987340
-
Security for the digital information age of medicine: Issues, applications and implementation
-
Epstein, M.A., M.S. Pasieka, W.P. Lord, S.T.C. Wong and N.J. Mankovich, 1998. Security for the digital information age of medicine: Issues, applications and implementation. J. Digit. Imag., 11: 33-44.
-
(1998)
J. Digit. Imag
, vol.11
, pp. 33-44
-
-
Epstein, M.A.1
Pasieka, M.S.2
Lord, W.P.3
Wong, S.T.C.4
Mankovich, N.J.5
-
10
-
-
78549271950
-
A new digital envelope approach for secure electronic medical records
-
Gobi, M. and K. Vivekanandan, 2009. A new digital envelope approach for secure electronic medical records. Int. J. Comput. Sci. Network Security, 9: 1-6.
-
(2009)
Int. J. Comput. Sci. Network Security
, vol.9
, pp. 1-6
-
-
Gobi, M.1
Vivekanandan, K.2
-
11
-
-
74349083769
-
An accurate method to obtain bio-metric measurements for three dimensional skull
-
Hameed, S.A., B.B. Zaidan, A.A. Zaidan, A.W. Naji and O.F. Tawfiq, 2010. An accurate method to obtain bio-metric measurements for three dimensional skull. J. Applied Sci., 10: 145-150.
-
(2010)
J. Applied Sci
, vol.10
, pp. 145-150
-
-
Hameed, S.A.1
Zaidan, B.B.2
Zaidan, A.A.3
Naji, A.W.4
Tawfiq, O.F.5
-
12
-
-
77954499630
-
Information and communication technology for participatory based decision-making-E-management for administrative efficiency in higher education
-
Hashim, F., G.M. Alam and S. Siraj, 2010. Information and communication technology for participatory based decision-making-E-management for administrative efficiency in higher education. Int. J. Phys. Sci., 5: 383-392.
-
(2010)
Int. J. Phys. Sci
, vol.5
, pp. 383-392
-
-
Hashim, F.1
Alam, G.M.2
Siraj, S.3
-
13
-
-
77954824252
-
On the Capacity and security of steganography approaches: An overview
-
Hmood, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010a. On the Capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
-
(2010)
J. Applied Sci
, vol.10
, pp. 1825-1833
-
-
Hmood, A.K.1
Jalab, H.A.2
Kasirun, Z.M.3
Zaidan, A.A.4
Zaidan, B.B.5
-
14
-
-
77958064851
-
On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates
-
Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010b. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062.
-
(2010)
Int. J. Phys. Sci
, vol.5
, pp. 1054-1062
-
-
Hmood, A.K.1
Kasirun, Z.M.2
Jalab, H.A.3
Alam, G.M.4
Zaidan, A.A.5
Zaidan, B.B.6
-
15
-
-
77954829600
-
An overview on hiding information technique in images
-
Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010c. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
-
(2010)
J. Applied Sci
, vol.10
, pp. 2094-2100
-
-
Hmood, A.K.1
Zaidan, B.B.2
Zaidan, A.A.3
Jalab, H.A.4
-
16
-
-
0035780544
-
Novel biometric digital signatures for Internet based applications
-
Janbandhu, P.K. and M.Y. Siyal, 2001. Novel biometric digital signatures for Internet based applications. Inform. Manage. Comput. Security, 9: 205-212.
-
(2001)
Inform. Manage. Comput. Security
, vol.9
, pp. 205-212
-
-
Janbandhu, P.K.1
Siyal, M.Y.2
-
17
-
-
56649102112
-
Revisiting Wiener's Attack-New Weak Keys in RSA
-
In: Information Security, Wu, T.C., C.L. Lei, V. Rijmen and D.T. Lee (Eds.), Springer-Verlag, Berlin, pp
-
Maitra, S. and S. Sarkar, 2008. Revisiting Wiener's Attack-New Weak Keys in RSA. In: Information Security, Wu, T.C., C.L. Lei, V. Rijmen and D.T. Lee (Eds.). LNCS. 5222, Springer-Verlag, Berlin, pp: 228-233.
-
(2008)
LNCS
, vol.5222
, pp. 228-233
-
-
Maitra, S.1
Sarkar, S.2
-
18
-
-
77952268534
-
Challenges of hidden data in the unused area two within executable files
-
Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
-
(2009)
J. Comput. Sci
, vol.5
, pp. 890-897
-
-
Naji, A.W.1
Zaidan, A.A.2
Zaidan, B.B.3
-
19
-
-
77955146619
-
A scalable and secure position-based routing protocol for ad-hoc networks
-
Qabajeh, L.K., M.L.M. Kiah and M.M. Qabajeh, 2009. A scalable and secure position-based routing protocol for ad-hoc networks. Malaysian J. Comput. Sci., 22: 99-120.
-
(2009)
Malaysian J. Comput. Sci
, vol.22
, pp. 99-120
-
-
Qabajeh, L.K.1
Kiah, M.L.M.2
Qabajeh, M.M.3
-
20
-
-
84857780686
-
Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing
-
Raad, M., N.M. Yeasin, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010. Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing. Afr. J. Bus. Manage., 4: 2362-2367.
-
(2010)
Afr. J. Bus. Manage
, vol.4
, pp. 2362-2367
-
-
Raad, M.1
Yeasin, N.M.2
Alam, G.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
21
-
-
70350660771
-
TruelP: Prevention of IP spoofing attacks using identity-based cryptography
-
Oct. 06-10 Famagusta, Cyprus
-
Schridde, C, M. Smith and B. Freisleben, 2009. TruelP: Prevention of IP spoofing attacks using identity-based cryptography. Proceedings of the 2nd International Conference of Security of Information and Networks, Oct. 06-10, Famagusta, Cyprus, pp: 128-137.
-
(2009)
Proceedings of the 2nd International Conference of Security of Information and Networks
, pp. 128-137
-
-
Schridde, C.1
Smith, M.2
Freisleben, B.3
-
22
-
-
0033120274
-
Security in health-care information systems-current trends
-
Smith, E. and J.H.P. Eloff, 1999. Security in health-care information systems-current trends. Int. J. Med. Inform., 54: 39-54.
-
(1999)
Int. J. Med. Inform
, vol.54
, pp. 39-54
-
-
Smith, E.1
Eloff, J.H.P.2
-
23
-
-
78650269547
-
Shoulder surfing resistance using penup event and neighbouring connectivity manipulation
-
Yee, P.L. and M.L.M. Kiah, 2010. Shoulder surfing resistance using penup event and neighbouring connectivity manipulation. Malaysian J. Comput. Sci., 23: 121-140.
-
(2010)
Malaysian J. Comput. Sci
, vol.23
, pp. 121-140
-
-
Yee, P.L.1
Kiah, M.L.M.2
-
24
-
-
77954826595
-
Investigate the capability of applying hidden data in text file: An overview
-
Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and H.A. Jalab, 2010a. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
-
(2010)
J. Applied Sci
, vol.10
, pp. 1916-1922
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Al-Fraja, A.K.3
Jalab, H.A.4
-
25
-
-
77954833269
-
An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael
-
Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010b. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167.
-
(2010)
J. Applied Sci
, vol.10
, pp. 2161-2167
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Al-Frajat, A.K.3
Jalab, H.A.4
-
26
-
-
77957325769
-
Novel approach for high (secure and rate) data hidden within triplex space for non multimedia file
-
Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010c. Novel approach for high (secure and rate) data hidden within triplex space for non multimedia file. Sci. Res. Essays, 5: 1965-1977.
-
(2010)
Sci. Res. Essays
, vol.5
, pp. 1965-1977
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Alanazi, H.O.3
Gani, A.4
Zakaria, O.5
Alam, G.M.6
-
27
-
-
78649273195
-
Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem
-
Zaidan, A.A., B.B. Zaidan, A.Y. Taqa, K.M.S. Mustafa, G.M. Alam and H.A. Jalab, 2010d. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Int. J. Phys. Sci., 5: 1992-2000.
-
(2010)
Int. J. Phys. Sci
, vol.5
, pp. 1992-2000
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Taqa, A.Y.3
Mustafa, K.M.S.4
Alam, G.M.5
Jalab, H.A.6
-
28
-
-
77954783981
-
On the differences between hiding information and cryptography techniques: An overview
-
Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010e. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
-
(2010)
J. Applied Sci
, vol.10
, pp. 1650-1655
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Al-Frajat, A.K.3
Jalab, H.A.4
-
29
-
-
78649299082
-
StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
-
Zaidan, B.B., A.A. Zaidan, A. Taqa, G.M. Alam, M.L.M. Kiah and H.A. Jalab, 2010f. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int. J. Phys. Sci.,5: 1796-1806.
-
(2010)
Int. J. Phys. Sci
, vol.5
, pp. 1796-1806
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Taqa, A.3
Alam, G.M.4
Kiah, M.L.M.5
Jalab, H.A.6
-
30
-
-
78651075908
-
A new hybrid module for skin detector using fuzzy inference system structure and explicit rules
-
In Press
-
Zaidan, A.A., H.A. Karim, N.N. Ahmed, G.M. Alam and B.B. Zaidan, 2010g. A new hybrid module for skin detector using fuzzy inference system structure and explicit rules. Int. J. Phys. Sci., (In Press).
-
(2010)
Int. J. Phys. Sci
-
-
Zaidan, A.A.1
Karim, H.A.2
Ahmed, N.N.3
Alam, G.M.4
Zaidan, B.B.5
-
31
-
-
78649415172
-
Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YcbCr
-
Zaidan, A.A., N.N. Ahmed, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010h. Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YcbCr. Sci. Res. Essays, 5: 2931-2946.
-
(2010)
Sci. Res. Essays
, vol.5
, pp. 2931-2946
-
-
Zaidan, A.A.1
Ahmed, N.N.2
Karim, H.A.3
Alam, G.M.4
Zaidan, B.B.5
-
32
-
-
78751500455
-
A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment skin adjacent-nested technique for neural network
-
In Press
-
Zaidan, A.A., H.A. Karim, N.N. Ahmed, G.M. Alam and B.B. Zaidan, 2010i. A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment skin adjacent-nested technique for neural network. Int. J. Phys. Sci., (In Press).
-
(2010)
Int. J. Phys. Sci
-
-
Zaidan, A.A.1
Karim, H.A.2
Ahmed, N.N.3
Alam, G.M.4
Zaidan, B.B.5
|