Tweet |
# | Project Name | Download | Supervisor Name | Students Names | |
1 | Implementing RC4 Encryption Algorithm in Android Under VB.NET | Dr. Soukaina Hasan | Rasul Kareem | Hasan Rahma | |
2 | Comparison between 3DES & AES | Lect. Iman Shaker | Wasen Ahmed | Anas Abdul Hadi | |
3 | Secure Code Generation for UOT Parking Cars | Dr. Bashar Saadon | Haider Akram | Zaid Nawaf | |
4 | Information Hiding in Webpage | Dr. Ikbas Iz Aldeen | Sharaf Aldeen Alaa | Iman Fawzi | |
5 | Improve File Encryption by Using Hybrid Method | Dr. Abeer Tariq | Ahmed Ataa | Malak Muhammed | |
6 | Protection Database From Un Authorization | Dr. Alaa Khadum | Thakaa Safaa | Zahraa Thamer | |
7 | Arabic Text Steganography | Dr. Abeer Tariq | Hasan Ali | Saif Raheem | |
8 | Text Steganography Using Con Key | Lect. Suhair Muhammed | Noor Aldeen Alaa | Aws Ahmed | |
9 | An Enhancement for Block Cipher Method | Asst. Lect. Ammar Fakhri | Zainab Muhammed | Khitam Muhammed | |
10 | Information Hiding in Digital Audio | Lect. Ikhlas Falih | Zahraa Muhammed | Rafal Zuhair | |
11 | Substitution Shifting Folding Symmetric Key | Asst. Lect. Farah Tawfeeq | Mina Faik | Dhuha Talaat | |
12 | Secret Sharing Schema for Image Cryptography | Dr. Iqbas Iz Aldeen | Sajad Yassin | Duaa Sabah | |
13 | A Proposal to Enhance a Block Cipher | Lect. Inass Tariq | Bariq Muqdam |
# | Project Name | Supervisor Name | Students Names | |
1 | E-commerce security using two fish algorithm | Lect. Asst. Ikhlas Khalaf | Yasamin Waleed | Mohammed Karim |
2 | Image coding using wavelet transform | Dr. Matheel Imad Aldeen | Noora Jabir | Sara Mohsen |
3 | Secure sending e-mail message with a “form” address from Denail of service attack | Lect. Mohemmed Natiq | Ibtihal Talib | Hadeel Jasim |
4 | Data mining with Anti viruses | Dr. Soukaina Hasan | Salah Abdul Rasool | Ahmed Adnan |
5 | Security for Global system for mobile communication - GSM | Lect. Asst. Zahraa Abdul Salam | Sara Moafaq | Mariam Shibeb |
6 | Image in image information hiding using cover regions and parity bits method | Lect. Asst. Ikhlas Falih | Mohammed Salih | Hiba Abdul Razaq |
7 | Authentication for speech recognition | Dr. Alaa Khadum | Jamal Ali | Mohammed Fawzi |
8 | Feature extraction for authentication | Lect. Asst. Nuha Jameel | Awaz Kareem | Sali Adnan |
9 | Implementing RSA using Baghdad method | Dr. Aliaa Kareem | Nuha Sabeeh | Zainab Alaa |
10 | Modify DES algorithm using generation digital image | Dr. Hala Bahjat | Murtada Thair | Mohammed Hashim |
11 | Hiding of data with security using steganography | Lect. Asst. Mohammed Ghani | Afrah Ali | Murtada Khadum |
12 | Compute data image compression using wavelet transform | Lect. Asst. Mohammed Ghani | Sinan Salim | Adil Abdul Kareem |
13 | Analyzing and Detecting Information Hiding in Computer Printer Text | Lect. Asst. Ragheed Dawod | Mazin Mohammed | Abbas Talal |
14 | Hiding Plaintext in Image File Using LSB Method | Lect. Asst. Asia Ali | Tabarak Zaki | Aliaa Abdullah |
15 | Build System Authorizing or Validity System in Student Database | Lect. Asst. Sura Ali | Hala Hassan | DHuha Dhiaa |
16 | Hide binary image in RGB image with substitution method | Lect. Asst. Noor Mushrek | Zaid Abdul Ameer | Duaa Fhadil |
17 | Digital Finger printing for relational data base using VB.net | Lect .Asst. Bashar Saadon | Mustafa Sattar | Hasanen Saed |