[PDF][PDF] A new method for voice signal features creation

MO Al-Dwairi, AY Hendi, MS Soliman… - International Journal of …, 2019 - academia.edu
Digital audio is one of the most important types of data at present. It is used in several
applications, such as human knowledge and many security and banking applications. A …

[PDF][PDF] Creating a stable and fixed features array for digital color image

ASN Asad, I Shayeb, Q Jaber, B Ayyoub, Z Alqadi… - 2019 - researchgate.net
Color image features extraction is an important and vital process, which is used in many
computer applications such as human fingerprint identification, therefore, shortening the …

[PDF][PDF] Highly Secure Method for Secret Data Transmission

M Barakat, Z Alqadi - International Journal of Scientific …, 2022 - researchgate.net
In this research, we present a new method for protecting confidential and private data, which
combines the two processes of data cryptography and data steganography. The data …

[PDF][PDF] Enhancing the Capacity of LSB Method by Introducing LSB2Z Method

Z Alqadi, B Zahran, Q Jaber, B Ayyoub… - International Journal of …, 2019 - researchgate.net
The purpose of steganography is to conceal the existence of the secret message in the
holding image, thus making a message unreadable by a third party. Steganography is an …

[PDF][PDF] Modified Inverse LSB Method for Highly Secure Message Hiding

M Abuzalata, Z Alqadi, J Al-Azzeh… - International Journal of …, 2019 - academia.edu
The data may be very important and very confidential and when sent in an insecure
environment may be stolen or being snatched on them, which eliminates the importance and …

[PDF][PDF] A novel methodology to extract voice signal features

S Khawatreh, B Ayyoub, A Abu-Ein… - International Journal of …, 2018 - researchgate.net
ABSTRACT A novel methodology to manipulate wave file and create a feature array for each
wave file will be introduced, this array can be used later on to recognize the voice file. A set …

[PDF][PDF] A methodology based on steganography and cryptography to protect highly secure messages

RJ Rasras, ZA AlQadi, MRA Sara - Engineering, Technology & …, 2019 - academia.edu
Steganography and cryptography are very important techniques used in data security to
hide and secure secret messages in transmitted data. This paper will introduce, implement …

[PDF][PDF] Wave file features extraction using reduced LBP

A Al-Qaisi, SA Khawatreh, AA Sharadqah… - International Journal of …, 2018 - researchgate.net
In this work, we present a novel approach for extracting features of a digital wave file. This
approach will be presented, implemented and tested. A signature or a key to any wave file …

[PDF][PDF] Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation

RJ Rasras, M Abuzalata, Z Alqadi… - … Journal of Computer …, 2019 - researchgate.net
Color image encryption-decryption is an important issue, because it is used in many
important applications. This paper will introduce 3 methods of image encryption-decryption …

[PDF][PDF] A new approach for data cryptography

Z Alqad, M Oraiqat, H Almujafet, S Al-Saleh… - International Journal of …, 2019 - academia.edu
Due to the large number of different computer applications transactions on the internet,
cryptography is a vital key in ensuring the security of the transactions. Cryptography is an …