Computer Sciences
قسم علوم الحاسوب - البحوث العلمية


البحوث العلمية المنجزة من قبل أعضاء الهيئة التدريسية ذات عامل التأثير Impact Factor

2014

Title: Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approch

Authors: Wafaa Mustafa Adbullah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan

Journal: Computers and Electrical Engineering

Date: 27-03-2014

Publisher: Elsevier

Abstract: in this paper, we present a novel method for data hiding within transform domain of the color images. our method is based on dividing an image into blocks , then applying the proposed transform on specified blocks and hiding the secret message within those. we show that the security can be increased by following this method since it depends on a different type of transform which is based on irreducible polunomial mathematics. the results and comparisons have proven high capacity alongside maintaining reasonable level



Title: Invariants Feature Points Detection based on Random sample Estimation

Authors: Kawther Abbas Sallal, Abdul-Monem Saleh Rahma

Journal: International Journal of computer applications, Volume 86 Issue 15 Pages 7 - 12

Date: 15-01-2014

Publisher: Foundation of Computer Sciences, USA

Abstract: Feature detection is the initial step in any analysis procedure and is essential for the performance of computer vision applicationslike stereo vision,object recogniation, object tracking systems.Research concerning the detection of feature points for different camera motion images in efficient and fast way. in this work , techniques of corner detection , geometric moments and random sampling are presented to simply and accurately locate the important feature points in image. for each extracted feature in image



2013

Title: Encryption using dual key transformation based on creation of multi S-Boses in AES Algorithm

Authors: Nada Hussein M. Ali, Abdul-Monem S. Rahma, Abdul-Mohsen Jaber

Journal: International Journal of computer applications, Volume 83 Issue 10 pages 1 - 6

Date: 01-12-2013

Abstract: The advance encryption standard (AES) is using in a large scale of applications that need to protect their data and information. A nonlinear substitution operation is the main factor of the AES cipher system stength. The S-Box component that used in AES is fixed, and not changeable. The purpose of the proposed approach is to use dual keys in encryption and decryption processes in SubByte transformation function. The first key generate multi random S-boxes depend on using multi keys that led to generate S-boxes



Title: Efficiency of SVM and PCA to Enhance Intrusion Detection System

Authors: Soukaena Hassan Hashem

Journal: Journal Of Asian Scientific Research, 2013, 3(4): 381-395.

Date: 2013

Abstract: Efficiency of SVM and PCA to Enhance Intrusion Detection System