Image Steganography by Mapping Pixels to Letters DMAF Al-Husainy Journal of Computer Science 5 (1), 33-38, 2009 | 93 | 2009 |
A novel encryption method for image security DMAF Al-Husainy International Journal of Security and Its Applications 6 (1), 2012 | 68 | 2012 |
Lightweight cryptography system for IoT devices using DNA MAF Al-Husainy, B Al-Shargabi, S Aljawarneh Computers and Electrical Engineering 95, 107418, 2021 | 47 | 2021 |
Image Encryption Using Genetic Algorithm DMAF Al-Husainy Information Technology Journal 5 (3), 516-519, 2006 | 45 | 2006 |
Best-Job-First CPU Scheduling Algorithm DMAF Al-Husainy Information Technology Journal 6 (2), 288-293, 2007 | 36 | 2007 |
Message segmentation to enhance the security of LSB image steganography DMAF Al-Husainy transit 3 (3), 2012 | 29 | 2012 |
Secure and Lightweight Encryption Model for IoT Surveillance Camera MAF Al-Husainy, B Al-Shargabi International Journal of Advanced Trends in Computer Science and Engineering …, 2020 | 21 | 2020 |
A new image steganography based on decimal-digits representation DMAF Al-Husainy Computer and Information Science 4 (6), 38, 2011 | 21 | 2011 |
A SECRET-KEY IMAGE STEGANOGRAPHY TECHNIQUE USING RANDOM CHAIN CODES AFAH Mohammed, MU Diaa International Journal of Technology 10 (4), 731-740, 2019 | 16* | 2019 |
MAC Address as a Key for Data Encryption DMAF Al-Husainy arXiv preprint arXiv:1311.3821, 2013 | 12 | 2013 |
Developed Segmented-LSB Image Steganography DMAF Al-Husainy ISTEC: International Science and Technology Conference 3, 354-359, 2012 | 12 | 2012 |
A new DNA based encryption algorithm for internet of things B Al-Shargabi, MAF Al-Husainy International Conference of Reliable Information and Communication …, 2020 | 11 | 2020 |
Image encryption technique based on the entropy value of a random block MAF Al-Husainy, DM Uliyan International Journal of Advanced Computer Science and Applications 8 (7), 2017 | 10 | 2017 |
Lightweight Cryptosystem for Image Encryption using Auto-Generated Key AH Mohammed, Abbas, Fadhil, AS Hamza, A., M Shadi, R. Journal of Engineering and Applied Sciences 13 (17), 7418-7425, 2018 | 9* | 2018 |
A Novel Steganography-Cryptography System MA Fadhil Proceedings of the World Congress on Engineering and Computer Science 1, 2010 | 9 | 2010 |
Multi-round encryption for COVID-19 data using the DNA key. B Al-Shargabi, MAF Al-Husainy International Journal of Electrical & Computer Engineering (2088-8708) 12 (1), 2022 | 7 | 2022 |
A SMOOTH TEXTUAL PASSWORD AUTHENTICATION SCHEME AGAINST SHOULDER SURFING ATTACK MAF Al-Husainy, DM ULIYAN Journal of Theoretical and Applied Information Technology 96 (09), 2546 - 2556, 2018 | 7 | 2018 |
Full Capacity Image Steganography Using Seven-Segment Display Pattern as Secret Key. MAF Al-Husainy, HA Al-Sewadi J. Comput. Sci. 14 (6), 753-763, 2018 | 7 | 2018 |
Image Steganography Method Preserves the Histogram Shape of Image DMAF Al-Husainy European Journal of Scientific Research 130 (1), 101 - 106, 2015 | 7 | 2015 |
Implementing Binary Search Tree Concept for Image Cryptography AH Mohammed, A., Fadhil, AS Hamza, A., A. International Journal of Advanced Science and Technology 130, 21-32, 2019 | 6* | 2019 |