متابعة
Nada Hussein M. Ali
Nada Hussein M. Ali
University of Baghdad - College of Science- Computer Science Department
بريد إلكتروني تم التحقق منه على sc.uobaghdad.edu.iq
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Security improvement in elliptic curve cryptography
KE Abdullah, NHM Ali
International Journal of Advanced Computer Science and Applications 9 (5), 2018
152018
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
NHM Ali, SA Abead
Iraqi Journal of Science 57 (4C), 2968-2978, 2016
112016
A secure enhancement for encoding/decoding data using Elliptic Curve Cryptography
KE Abdullah, NHM Ali
Iraqi Journal of Science, 189-198, 2018
92018
An efficient audio encryption based on chaotic logistic map with 3D matrix
Y Hameed, N Ali
Journal of Theoretical and Applied Information Technology 96 (16), 5142-5152, 2018
92018
Text hiding in Color Images using the Secret Key Transformation Function in GF (2n)
NHM Ali, AMS Rahma, AS Jamil
Iraqi Journal of Science 56 (4B), 3240-3245, 2015
82015
Security Scheme Enhancement for Voice over Wireless Networks
MC Firas Hazzaa , Antesar M. Shabut , Nada Hussein M. Ali
Journal of Information Security and Applications 58, 13, 2021
7*2021
The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network
ES 21. Firas Hazzaa , Sufian Yousef , Nada H. Ali
IEEE 12th International Conference on Global Security, Safety and …, 2019
62019
Random Key Permutation Stream Algorithm Based on Modified Functions in AES Algorithm
N Ali, A Rahma, S Yousef, M Jaber
International Journal of Engineering and Technology 4 (6), 367-373, 2014
52014
Using steganography techniques for implicit authentication to enhance sensitive data hiding
RN Kadhum, NHM Ali
International Journal of Nonlinear Analysis and Applications 13 (1), 3973-3983, 2022
42022
Enhanced RC5 Key Schedule Using One-Dimensional Cellular Automata for Audio File Encryption
YM Hameed, NHM Ali
Iraqi Journal of Science, 388-401, 2019
42019
A Byte-Oriented Multi Keys Shift Rows Encryption and Decryption Cipher Processes in Modified AES
NM Ali, AMS Rahma, AM Jaber, S Yousef
International Journal of Scientific & Engineering Research 5 (4), 953-955, 2014
42014
Encryption using dual key transformation based on creation of multi S-boxes in AES algorithm
NHM Ali, AMS Rahma, AM Jaber
International Journal of Computer Applications 83 (10), 2013
42013
Detecting similarity in color images based on perceptual image hash algorithm
NHM Ali, ME Mahdi
IOP Conference Series: Materials Science and Engineering 737 (1), 012244, 2020
32020
Using Shape Representation to Design Panoraama Video System
AS Jamil, AMS Rahma, NHM Ali
Al-Mansour Journal 25 (1), 49-66, 2016
32016
Generating Streams of Random Key Based on Image Chaos and Genetic Algorithm
FF Saleh, NHM Ali
Iraqi Journal of Science, 3652-3661, 2022
22022
A secure cipher for the gray images based on the shamir secret sharing scheme with discrete wavelet haar transform
RJ Toama, NHM Ali
journal of,” Mech. of Contin. & Math. Sci 15 (6), 334-351, 2020
22020
Lookup table algorithm for error correction in color images
RA Abdulsattar, NHM Ali
JOIV: International Journal on Informatics Visualization 2 (2), 63-67, 2018
22018
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables
NHM Ali, RA Abdul-Sattar
Iraqi Journal of Science, 1729-1739, 2017
22017
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space.
MT Abdullah, NHM Ali
International Journal of Intelligent Engineering & Systems 16 (3), 2023
12023
Luminance Pre-processing For Facial Composite System
MFAHNHM Ali
Eng. & Technology 24 (5), 782-789, 2005
1*2005
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20