Proposed random unified chaotic map as PRBG for voice encryption in wireless communication SB Sadkhan, RS Mohammed Procedia computer science 65, 314-323, 2015 | 57 | 2015 |
Speech scrambler based on proposed random chaotic maps RS Mohammed, SB Sadkhan Multidisciplinary in IT and Communication Science and Applications (AIC …, 2016 | 20 | 2016 |
Recent Audio Steganography Trails and its Quality Measures SB Sadkhan, AA Mahdi, RS Mohammed 2019 First International Conference of Computer and Applied Sciences (CAS …, 2019 | 17 | 2019 |
A proposed voice encryption based on Random Lorenz map with DCT permutation SB Sadkhan, RS Mohammed International Journal of Advancements in Computing Technology 7 (3), 90, 2015 | 16 | 2015 |
Chaos based cryptography for voice encryption in wireless communication SB Sadkhan, A Al-Sherbaz, RS Mohammed 2013 International Conference on Electrical Communication, Computer, Power …, 2013 | 15 | 2013 |
Security and privacy in the Internet of Things (IoT): Survey RS Mohammed, AH Mohammed, FN Abbas 2019 2nd International Conference on Electrical, Communication, Computer …, 2019 | 12 | 2019 |
Data hiding based on independent component analyses (ICA) AA Mahdi, RS Mohammed, SB Sadkhan Solid State Technology 63 (3), 3617-3638, 2020 | 11 | 2020 |
Stream cipher based on chaotic maps EL Mohaisen, RS Mohammed 2019 First International Conference of Computer and Applied Sciences (CAS …, 2019 | 9 | 2019 |
Lightweight authentication methods in IoT: Survey WK Ahmed, RS Mohammed 2022 International Conference on Computer Science and Software Engineering …, 2022 | 8 | 2022 |
Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network RS Mohammed, KK Jabbar, HA Hilal International Journal of Electrical and Computer Engineering (IJECE) 11 (4 …, 2021 | 6 | 2021 |
Subject review: cloud computing security based on cryptography AA Maryoosh, RS Mohammed, RA Mustafa International Journal of Engineering Research and Advanced Technology-IJERAT …, 2019 | 6 | 2019 |
Hybridity of Cryptography and Steganography Techniques: Current Status RS Mohammed, SB Sadkhan International Conference on Change, Innovation, Informatics and Disruptive …, 2016 | 6 | 2016 |
A novel technique of privacy preserving association rule mining RS Mohammed, EM Hussien, JR Mutter Multidisciplinary in IT and Communication Science and Applications (AIC …, 2016 | 6 | 2016 |
Security Challenges and Cyber-Attacks for Internet of Things RM Abdul-Hussein, RS Mohammed, AH Mohammed 2021 1st Babylon International Conference on Information Technology and …, 2021 | 5 | 2021 |
Improving Salsa20 stream cipher using random chaotic maps EL Mohaisen, RS Mohammed 2020 3rd International Conference on Engineering Technology and its …, 2020 | 5 | 2020 |
Chaos-Based Cryptography for Voice Secure Wireless-Chapter 4 SB Sadkhan, R Saad Multidisciplinary Perspectives in Cryptology and Information Security, 97-132, 2014 | 5 | 2014 |
TEXT CRYPTOGRAPHY USING MULTIPLE ENCRYPTION ALGORITHMS BASED ON CIRCULAR QUEUE VIA CLOUD COMPUTING ENVIRONMENT. KK JABBAR, HABD HILAL, RS MOHAMMED Journal of Theoretical & Applied Information Technology 96 (12), 2018 | 4 | 2018 |
Iris matching Using SURF algorithm RS Mohammed, NJ Habeeb, ZM Abood International Journal of Signal Processing, Image Processing and Pattern …, 2016 | 4 | 2016 |
Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher SK Avakian, RS Mohammed Engineering and Technology Journal 27 (10), 2009 | 4 | 2009 |
Image encryption technique using clustering and stochastic standard map RS Mohammed, FH Abbood, IA Yousif Multidisciplinary in IT and Communication Science and Applications (AIC …, 2016 | 3 | 2016 |