Found: 254 resources
Theoretical Background of Cryptography
Mesopotamian Journal of CyberSecurity, 2023, Volume 2023, Issue VOL 3, Pages 7-15
New Approach to Partial Cryptography Using 2D Wavelet Transform
Al-Rafidain University College For Sciences, 2010, Volume , Issue 26, Pages 55-68
Image Stego Detection using Higher Order Statistics
Al-Nahrain Journal for Engineering Sciences, 2010, Volume 13, Issue 2, Pages 141-149
Combination of Cryptography and Channel Coding for Wireless Communications
Journal of Al-Ma'moon College, 2015, Volume , Issue 26, Pages 269-285
New Encrypted Steganography Approach
Journal of University of Babylon, 2018, Volume 26, Issue 2, Pages 36-46
Increase Security of Image Encryption Depends on Change Pixel Location
journal of the college of basic education, 2017, Volume 23, Issue 98/علمي, Pages 57-64
Proposal Hybrid CBC Encryption System to Protect E-mail Messages
Iraqi Journal of Science, 2019, Volume 60, Issue 1, Pages 157-170
Enhancement of System Security by Using LSB and RSA Algorithms
Al-Khwarizmi Engineering Journal, 2022, Volume 18, Issue 1, Pages 26-37
Generate Random Image-Key using Hash Technique
Engineering and Technology Journal, 2010, Volume 28, Issue 2, Pages 382-398
Encrypting Audio Data Hiding by Visual Secret Sharing
Engineering and Technology Journal, 2009, Volume 27, Issue 13, Pages 2352-2364