[PDF][PDF] Long Messages Segmentation for Efficient Message Cryptography

H Zaini, Z Alqadi - IJCSMC, 2023 - researchgate.net
Protecting LSB method of data steganography is a vital issue. In this paper research a
secure LSB method will be introduced. The method will use a private key to divide a …

[PDF][PDF] Multiple Blocks, Multiple Rounds Method for Image Cryptography

Z Alqadi - International Journal of Computer Science and Mobile …, 2023 - academia.edu
In this research paper a simple, flexible, secure and efficient method of digital image
cryptography will be introduced. The method will enhance some features of standard …

[PDF][PDF] Enhanced Efficiency and Security in LSB2 Steganography: Burst Embedding and Private Key Integration.

RJ Rasras, MR Abu Sara, Z Alqadi - Traitement du Signal, 2023 - researchgate.net
In the realm of digital colour image steganography, the utilisation of an image key for the
extraction of essential covering stego-bytes from predetermined secret positions was …

[PDF][PDF] Simple and Efficient Chaotic Based Method of Message Cryptography

Z Alqadi, M Al-Raqqad - … Journal of Computer Science and Mobile …, 2023 - researchgate.net
A simple and easy to implement method of secret message cryptography will be introduced.
The message to be encrypted-decrypted is to be converted to binary matrix, this matrix is to …

[PDF][PDF] Securing Message Steganography by using Modified LSB Method

Z Alqadi, M Al-Raqqad - 2023 - researchgate.net
Message steganography is one of the popular methods used to protect secret message. In
this research paper a modified LSB method of message steganography will be introduced …

[PDF][PDF] International Journal of Advanced Trends in Computer Science and Engineering

AM Alqudah, H Alquraan, IA Qasmieh, A Alqudah… - International …, 2019 - arxiv.org
Deep Learning is the newest and the current trend of the machine learning field that paid a
lot of the researchers' attention in the recent few years. As a proven powerful machine …

2x2 matrix multiplication with 4-bit elements in 45nm cmos technology

CR Patel, V Urankar, BA Vivek - 2020 4th International …, 2020 - ieeexplore.ieee.org
A simple and effective method for matrices multiplication is proposed. The determination of
the resultant output matrix can either performed in parallel or sequentially, both resulting in …

[PDF][PDF] LSB8 using DSF to Hide Secret Message

Z Al Qadi, HN Hatamleh - 2024 - researchgate.net
An efficient method of message steganography will be proposed, the method will use 8 bits
from the speech sample binary value to hold one character from the secret message, thus …

[PDF][PDF] Analysis of Chaotic Logistic Map used to Generate Secret Keys

Z Alqadi - 2024 - researchgate.net
Chaotic logistic map is a good model which can be used to generate various secret keys
used in data cryptography. In this paper research a detailed analysis of CLM will be …

[PDF][PDF] Hybrid, Secure and Highly Speed Method for Color Image Cryptography

Z AlQadi - 2023 - researchgate.net
A new method of color image cryptography will be produced, it will be shown the simplicity
and easy use of this method, which can be used to encrypt-decrypt any image with any size …