Tweet |
البحوث العلمية المنجزة من قبل أعضاء الهيئة التدريسية ذات عامل التأثير Impact Factor
2014
Title: Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approch
Authors: Wafaa Mustafa Adbullah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan
Journal: Computers and Electrical Engineering
Date: 27-03-2014
Publisher: Elsevier
Abstract: in this paper, we present a novel method for data hiding within transform domain of the color images. our method is based on dividing an image into blocks , then applying the proposed transform on specified blocks and hiding the secret message within those. we show that the security can be increased by following this method since it depends on a different type of transform which is based on irreducible polunomial mathematics. the results and comparisons have proven high capacity alongside maintaining reasonable level
Title: Invariants Feature Points Detection based on Random sample Estimation
Authors: Kawther Abbas Sallal, Abdul-Monem Saleh Rahma
Journal: International Journal of computer applications, Volume 86 Issue 15 Pages 7 - 12
Date: 15-01-2014
Publisher: Foundation of Computer Sciences, USA
Abstract: Feature detection is the initial step in any analysis procedure and is essential for the performance of computer vision applicationslike stereo vision,object recogniation, object tracking systems.Research concerning the detection of feature points for different camera motion images in efficient and fast way. in this work , techniques of corner detection , geometric moments and random sampling are presented to simply and accurately locate the important feature points in image. for each extracted feature in image
2013
Title: Encryption using dual key transformation based on creation of multi S-Boses in AES Algorithm
Authors: Nada Hussein M. Ali, Abdul-Monem S. Rahma, Abdul-Mohsen Jaber
Journal: International Journal of computer applications, Volume 83 Issue 10 pages 1 - 6
Date: 01-12-2013
Abstract: The advance encryption standard (AES) is using in a large scale of applications that need to protect their data and information. A nonlinear substitution operation is the main factor of the AES cipher system stength. The S-Box component that used in AES is fixed, and not changeable. The purpose of the proposed approach is to use dual keys in encryption and decryption processes in SubByte transformation function. The first key generate multi random S-boxes depend on using multi keys that led to generate S-boxes
Title: Efficiency of SVM and PCA to Enhance Intrusion Detection System
Authors: Soukaena Hassan Hashem
Journal: Journal Of Asian Scientific Research, 2013, 3(4): 381-395.
Date: 2013
Abstract: Efficiency of SVM and PCA to Enhance Intrusion Detection System