[PDF][PDF] Creating a stable and fixed features array for digital color image

ASN Asad, I Shayeb, Q Jaber, B Ayyoub, Z Alqadi… - 2019 - researchgate.net
Color image features extraction is an important and vital process, which is used in many
computer applications such as human fingerprint identification, therefore, shortening the …

A novel based on image blocking method to encrypt-decrypt color

J Al-Azzeh, B Zahran, Z Alqadi, B Ayyoub… - … : International Journal on …, 2019 - joiv.org
Encryption of digital color image is the process of conversion original digital color image into
an encrypted one to protect the image from hacking or to prevent an authorized person to …

[PDF][PDF] Highly Secure Method for Secret Data Transmission

M Barakat, Z Alqadi - International Journal of Scientific …, 2022 - researchgate.net
In this research, we present a new method for protecting confidential and private data, which
combines the two processes of data cryptography and data steganography. The data …

[PDF][PDF] Enhancing the Capacity of LSB Method by Introducing LSB2Z Method

Z Alqadi, B Zahran, Q Jaber, B Ayyoub… - International Journal of …, 2019 - researchgate.net
The purpose of steganography is to conceal the existence of the secret message in the
holding image, thus making a message unreadable by a third party. Steganography is an …

[PDF][PDF] Analysis of procedures used to build an optimal fingerprint recognition system

A Hindi, MO Dwairi, Z Alqadi - International Journal of Computer …, 2020 - academia.edu
Fingerprint recognition is one of the most widely use operation, due the big number of
applications requiring this operation, so seeking a good method of fingerprint features …

[PDF][PDF] Analysis of digital voice features extraction methods

JNI Shayeb, Z Alqadi, J Nader - International Journal of …, 2019 - researchgate.net
K means method and LBP based methods are commonly used for manipulating digital wave
files, and they can be used for wave file features extraction, these features can be used later …

[PDF][PDF] Modified Inverse LSB Method for Highly Secure Message Hiding

M Abuzalata, Z Alqadi, J Al-Azzeh… - International Journal of …, 2019 - academia.edu
The data may be very important and very confidential and when sent in an insecure
environment may be stolen or being snatched on them, which eliminates the importance and …

[PDF][PDF] A methodology based on steganography and cryptography to protect highly secure messages

RJ Rasras, ZA AlQadi, MRA Sara - Engineering, Technology & …, 2019 - academia.edu
Steganography and cryptography are very important techniques used in data security to
hide and secure secret messages in transmitted data. This paper will introduce, implement …

[PDF][PDF] Performance analysis of artificial neural networks used for color image recognition and retrieving

J Al-Azzeh, Z Alqadi, M Abuzalata - international Journal of …, 2019 - academia.edu
Image recognition refers to methods and technologies that identify digital images such as
places, logos, people, objects, buildings, and several other variables in images. Users are …

[PDF][PDF] Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation

RJ Rasras, M Abuzalata, Z Alqadi… - … Journal of Computer …, 2019 - researchgate.net
Color image encryption-decryption is an important issue, because it is used in many
important applications. This paper will introduce 3 methods of image encryption-decryption …