[PDF][PDF] The applications of discrete wavelet transform in image processing: A review

G Othman, DQ Zeebaree - Journal of Soft Computing and …, 2020 - publisher.uthm.edu.my
This paper reviews the newly published works on applying waves to image processing
depending on the analysis of multiple solutions. the wavelet transformation reviewed in …

[PDF][PDF] Significant features for steganography techniques using deoxyribonucleic acid: a review

NA Zebari, DA Zebari, DQ Zeebaree… - Indonesian Journal of …, 2021 - academia.edu
Information security and confidentiality are the prime concern of any type of communication.
Rapidly evolution of technology recently, leads to increase the intruder's ability and a main …

QR code based color image stego-crypto technique using dynamic bit replacement and logistic map

P Mathivanan - Optik, 2021 - Elsevier
This paper uses a novel color image stego-crypto technique to enhance the capacity,
security and robustness of data embedding process. The proposed scheme uses a base64 …

[PDF][PDF] Hiding image by using contourlet transform

DQ Zeebaree, AM Abdulazeez, OMS Hassan… - vol, 2020 - academia.edu
The goal of the paper is to provide a practical conceptual framework based on hiding of
watermarks embedded within coefficients image disintegrated by contourlet transform, that is …

[PDF][PDF] New symmetric key cipher capable of digraph to single letter conversion utilizing binary system

NA Kako, HT Sadeeq, AR Abrahim - Indonesian Journal of …, 2020 - researchgate.net
In this paper, a new Playfair cipher built on bits level symmetric key cryptographic was
proposed for the purpose of converting pairs of letters (digraphs) into single letters. The …

[PDF][PDF] Wavelet applications in medical images: A review

AM Abdulazeez, DQ Zeebaree, DM Abdulqader - Transform. DWT, 2020 - researchgate.net
This paper is review of wavelet applications in medical images. The main task of image
processing is image demising wavelet transforms are used to apply medical images to …

[PDF][PDF] Pipelined Parallel Processing Implementation based on Distributed Memory Systems

AM Abdulazeeza, LL Nahmatwllab… - International Journal of …, 2020 - researchgate.net
Complex problems take a long time to solve, with low efficiency and performance. So, to
overcome these barriers and problems, studies have headed towards a way to divide the …

[PDF][PDF] Securing speech signals by watermarking binary images in the wavelet domain

RS Rashid, JR Mohammed - Indonesian Journal of Electrical …, 2020 - researchgate.net
Digital watermarking is the process of embedding particular information into other signal
data in such a way that the quality of the original data is maintained and secured …

Securing electronic health system using crystographic technique

YS Abdulsalam, OM Olaniyi… - International Journal of …, 2019 - inderscienceonline.com
Telemedicine application mostly takes place in advance settlements, where important
medical information is to be effectively secured and transmitted on public networks. Whilst …

Kriptografi, steganografi ve kodlama teorisinin grup teorisi ile ilişkisinin incelenmesi ve bazı uygulamaların geliştirilmesi

M Kalkan, Z Zararsız - 2021 - acikerisim.nevsehir.edu.tr
Bu tezin amacı: Kriptografi, steganografi ve kodlama teorisinin grup teorisi ile ilişkisinin
incelenmesi; esnek küme ve esnek gruplar kullanılarak esnek kriptografi, esnek …