A new steganographic method for embedded image in audio file DN Hmood, KA Khudhiar, MS Altaei International Journal of Computer Science and Security (IJCSS) 6 (2), 135-141, 2012 | 24 | 2012 |
PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER SMH Dalal N. Hamood journal of Al-Nahrain University - Science 13 (4), 211-215, 2010 | 14* | 2010 |
Modified Lightweight AES based on Replacement Table and Chaotic System DN Hamood international congress on Human-Computer Interaction, Optimization, and …, 2022 | 4 | 2022 |
Extracting numerical data from unstructured Arabic texts (ENAT) AK Al- Mashhadany, DN Hamood, ATS Al-Obaidi, WK Al-Mashhadany https://www.researchgate.net/publication …, 2021 | 4 | 2021 |
Message Authentication Using New Hash Function HS Abdulah, MAH Al-Rawi, DN Hammod Al-Nahrain Journal of Science 19 (3), 148-153, 2016 | 4 | 2016 |
An enhancement method based on modifying cfb mode for key generation in aes algorithm H S Abdulah, MA Al-Rawi, D N Hammod Engineering and Technology Journal 34 (6B), 759-768, 2016 | 2 | 2016 |
A Random Key Generation Approach for Rijndael Algorithm DN Hamood Journal of Al-Nahrain University 15 (3), 190-195, 2012 | 1 | 2012 |
A Review of Reversible Data Hiding-Encrypted Image (RDH-EI) Methods Arab Journal of Sciences & Research Publishing, 12, 2022 | | 2022 |
Biometric Authentication Based on Hash Iris Features DN Hamood https://www.cscjournals.org/manuscript/Journals/IJBB/Volume13/Issue1/IJBB …, 2020 | | 2020 |
Analysis of AES Algorithm Effects on the Diffusion Property HS Abdulah, MAH Al-Rawi, DN Hammod Al-Mansour Journal 29 (29), 23-39, 2018 | | 2018 |
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI) HS Abdullah, MA Alrawi, DN Hammod Baghdad Science Journal 14 (4), 0823-0823, 2017 | | 2017 |
Iris Recognition through Features Vector Using Artificial Neural Network HA Alani, DN Hamood International Journal of Advanced Computing 6 (1), 1-6, 2014 | | 2014 |