متابعة
Nagham Hamid
Nagham Hamid
UOITC
بريد إلكتروني تم التحقق منه على uoitc.edu.iq - الصفحة الرئيسية
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Image steganography techniques: an overview
N Hamid, A Yahya, RB Ahmad, OM Al-Qershi
International Journal of Computer Science and Security (IJCSS) 6 (3), 168-187, 2012
2602012
A Comparison between using SIFT and SURF for characteristic region based image steganography
N Hamid, A Yahya, RB Ahmad, OM Al-Qershi
International Journal of Computer Science Issues (IJCSI) 9 (3), 110, 2012
392012
Characteristic region based image steganography using speeded-up robust features technique
N Hamid, A Yahya, RB Ahmad, O Al-Qershi
2012 International Conference on Future Communication Networks, 141-146, 2012
362012
Steganography in image files: A survey
N Hamid, A Yahya, RB Ahmad, D Najim, L Kanaan
Australian Journal of Basic and Applied Sciences 7 (1), 35-55, 2013
212013
Secured and robust information hiding scheme
NH Abdul-Mahdi, A Yahya, RB Ahmad, OM Al-Qershi
Procedia Engineering 53, 463-471, 2013
172013
Enhancing visual quality of spatial image steganography using SqueezeNet deep learning network
N Hamid, BS Sumait, BI Bakri, O Al-Qershi
Multimedia Tools and Applications 80 (28), 36093-36109, 2021
132021
An improved robust and secured image Steganographic scheme
N Hamid, A Yahya, RB Ahmad, OM Al-Qershi
International Journal of Electronics and Communication Engineering …, 2012
102012
Enhancing the robustness of digital image steganography using ECC and redundancy
N Hamid, A Yahya, RB Ahmad, D Najim, L Kanaan
WULFENIA Journal 20 (4), 153-169, 2013
92013
Osamah M,“Image Steganography Techniques: An Over-view”
N Hamid, A Yahya, RB Ahmad
International Journal of computer science and securi-ty 6 (3), 2012
52012
Image Steganography Techniques: An Overview,‖ in International Journal of Computer Science and Security (IJCSS)
N Hamid, A Yahya, RB Ahmad, OM Al-Qershi
Volume (6), 2012
22012
Secured and robust information hiding scheme
AM Nagham Hamed, Y Abid, R Badlishah, AQ Osamah M
Elsevier BV, 2013
2013
Robust and Secured Data Hiding Schemes Using Digital Image Steganography
NH Abdul-Mahdi
School of Computer and Communication Engineering, 2013
2013
Blind image Steganography scheme using speeded-up robust features technique
H Nagham, Y Abid, R Badlishah, M Osamah
Universiti Malaysia Perlis (UniMAP), 2012
2012
This item is protected by original copyright
IHBINA AZIZ, FR HIGH, H VINYL
University of Birmingham, 2008
2008
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–14