关注
Nagham Hamid
Nagham Hamid
UOITC
在 uoitc.edu.iq 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Image steganography techniques: an overview
N Hamid, A Yahya, RB Ahmad, OM Al-Qershi
International Journal of Computer Science and Security (IJCSS) 6 (3), 168-187, 2012
2692012
A Comparison between using SIFT and SURF for characteristic region based image steganography
N Hamid, A Yahya, RB Ahmad, OM Al-Qershi
International Journal of Computer Science Issues (IJCSI) 9 (3), 110, 2012
402012
Characteristic region based image steganography using speeded-up robust features technique
N Hamid, A Yahya, RB Ahmad, O Al-Qershi
2012 International Conference on Future Communication Networks, 141-146, 2012
362012
Steganography in image files: A survey
N Hamid, A Yahya, RB Ahmad, D Najim, L Kanaan
Australian Journal of Basic and Applied Sciences 7 (1), 35-55, 2013
202013
Secured and robust information hiding scheme
NH Abdul-Mahdi, A Yahya, RB Ahmad, OM Al-Qershi
Procedia Engineering 53, 463-471, 2013
172013
Enhancing visual quality of spatial image steganography using SqueezeNet deep learning network
N Hamid, BS Sumait, BI Bakri, O Al-Qershi
Multimedia Tools and Applications 80 (28), 36093-36109, 2021
152021
An improved robust and secured image Steganographic scheme
N Hamid, A Yahya, RB Ahmad, OM Al-Qershi
International Journal of Electronics and Communication Engineering …, 2012
112012
Enhancing the robustness of digital image steganography using ECC and redundancy
N Hamid, A Yahya, RB Ahmad, D Najim, L Kanaan
WULFENIA Journal 20 (4), 153-169, 2013
92013
Osamah M,“Image Stega nography Techniques: An Over-vievv”
N Hamid, A Yahya, RB Ahmad
International Journal of computer science and securi-ty 6 (3), 2O12, 0
5
Image Steganography Techniques: An Overview,‖ in International Journal of Computer Science and Security (IJCSS)
N Hamid, A Yahya, RB Ahmad, OM Al-Qershi
Volume (6), 2012
32012
Secured and robust information hiding scheme
AM Nagham Hamed, Y Abid, R Badlishah, AQ Osamah M
Elsevier BV, 2013
2013
Robust and Secured Data Hiding Schemes Using Digital Image Steganography
NH Abdul-Mahdi
School of Computer and Communication Engineering, 2013
2013
This item is protected by original copyright
HC YONG
UNIVERSITI MALAYSIA PERLIS, 2013
2013
Blind image Steganography scheme using speeded-up robust features technique
H Nagham, Y Abid, R Badlishah, M Osamah
Universiti Malaysia Perlis (UniMAP), 2012
2012
系统目前无法执行此操作,请稍后再试。
文章 1–14