[PDF][PDF] Highly Secure Method for Secret Data Transmission

M Barakat, Z Alqadi - International Journal of Scientific …, 2022 - researchgate.net
In this research, we present a new method for protecting confidential and private data, which
combines the two processes of data cryptography and data steganography. The data …

[PDF][PDF] Enhancing the Capacity of LSB Method by Introducing LSB2Z Method

Z Alqadi, B Zahran, Q Jaber, B Ayyoub… - International Journal of …, 2019 - researchgate.net
The purpose of steganography is to conceal the existence of the secret message in the
holding image, thus making a message unreadable by a third party. Steganography is an …

[PDF][PDF] Color image compression using linear prediction coding

A Hindi, GM Qaryouti, Y Eltous… - International Journal of …, 2020 - academia.edu
Data compression is a process of reducing the data size to minimize the storage size and
the data transmission time, will decompression means recovering the original data without …

[PDF][PDF] Proposed Implementation Method to Improve LSB Efficiency

Z Alqadi, B Zahran, Q Jaber, B Ayyoub… - … Journal of Computer …, 2019 - researchgate.net
Data steganography is an important process, which is needed in various human life
applications, so the need for efficient method of data hiding is vital issue. In this paper we …

[PDF][PDF] Improving Average and Median Filters

H Zaini, Z Alqadi - International Journal of Computer Science and …, 2023 - academia.edu
Average and median filters are the most popular filters used to reduce the negative effects of
salt and pepper noise affected gray and color images, these filters work good when the …

[PDF][PDF] Carrier Image Rearrangement to Enhance the Security Level of LSB Method of Data Steganography

MKA Zalata, MT Barakat, ZA Alqadi - International Journal of …, 2022 - researchgate.net
Least significant bit method is one of the most popular methods of data steganography, this
method is very simple and provides good values for MSE and PSNR. LSB method is not …

[PDF][PDF] Securing Digital Image using Modified Chaotic Logistic Key

MT Barakat, ZA Alqadi - transactions, 2022 - researchgate.net
Digital image is an important data type due to the wide applications requiring this data type.
Some applications require image securing to protect the image from being hacked …

[PDF][PDF] Speech Files Cryptography using Indices Keys and Blocking

Z Alqadi, MT BARAKAT - International Journal of Computer …, 2023 - researchgate.net
Protecting speech file is a vital issue. In this paper research a simple method of speech
cryptography will be introduced. The method will use indices key to perform simple …

[PDF][PDF] Improving the Use of Chaotic Keys in Message Cryptography

H Zaini, Z Alqadi - International Journal of Computer Science and …, 2023 - researchgate.net
Using chaotic logistic keys in message cryptography is a popular technique; it provides a
high level of message security by protecting it from being hacked. This technique becomes …

[PDF][PDF] Multiple CLMMs Keys to Secure Message Transmission

QJZ Alqadi, Q Jaber - … Journal of Computer Science and Mobile …, 2022 - researchgate.net
A simple, flexible and efficient method of message cryptography will be introduced. The
method will suit any message with any length, it can use one or more rounds to apply …