1.

A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak)

Volume 22, Issue 2, June 2022, Pages 53-62
Yusra Ahmed Ghareeb; Ekhlas Khalaf Gbashi

2.

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Volume 10, Issue 3, September 2014, Pages 3-9
Bashar S. Mahdi; Alia K. Abdul Hassan

3.

A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function

Volume 29, Issue 16, December 2011, Pages 3291-3301
Muna Mohammed Al-Nayar

4.

Copyright Protection Service for Mobile Images

Volume 34, 4B, April 2016, Pages 444-450
Israa Abdul- Ameer Abdul-Jabbar; Suhad Malallah Kadhim

5.

Generate Random Image-Key using Hash Technique

Volume 28, Issue 2, January 2010, Pages 382-398
Nidaa F. Hassan; Akbas E. Ali; Teaba Wala Aldeen

6.

Hiding in Text using Information Integrity Service

Volume 6, Issue 1, April 2009, Pages 115-122
Dujan B. Taha; Ahmed S. Nori; Yaseen H. Ismaiel

7.

Hybrid Techniques for Proposed Intelligent Digital Image Watermarking

Volume 33, 4B, April 2015, Pages 702-713
Bashar S Mahdi; Alia K. Abdul Hassan

8.

Proposed Digital Signature Using One Time Pad

Volume 31, 2 B, February 2013, Pages 261-275
Shaimaa H. Shaker

9.

Watermarking for Relational Database by using Threshold Generator

Volume 29, Issue 1, January 2011, Pages 33-43
Bashar Saadoon Mahdi; Yossra H. Ali


Journal Management System. Powered by ejournalplus.com