Cloud computing security: abuse and nefarious use of cloud computing YA Hamza, MD Omar Int. J. Comput. Eng. Res 3 (6), 22-27, 2013 | 28 | 2013 |
An enhanced approach of image steganographic using discrete shearlet transform and secret sharing YA Hamza, NE Tewfiq, MQ Ahmed Baghdad Science Journal 19 (1), 0197-0197, 2022 | 8 | 2022 |
Highly secure image steganography approach using Arnold's Cat map and maximum image entropy YA Hamza Proceedings of the international conference on information and communication …, 2019 | 5 | 2019 |
Blok kırpma kodlamasına ve ayrık dalgacık dönüşümüne dayalı, dayanıklı dijital renkli resim damgalama sistemi YA Hamza PQDT-Global, 2008 | 5 | 2008 |
An Efficient Method of Image Encryption Using Rossler Chaotic System YA Hamza, MD Omar Academic Journal of Nawroz University(AJNU) 10 (2), 11-22, 2021 | 3 | 2021 |
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet Transform YA Hamza OSR Journal of Computer Engineering (IOSR-JCE) e-ISSN, 2278-0661, 2013 | 2 | 2013 |
A Secured Method of Reversible Data Hiding YA Hamza, WM Abduallah 2020 International Conference on Computer Science and Software Engineering …, 2020 | | 2020 |
A New Approach of LSB Data Hiding Based on Automatic Thresholding Technique YA Hamza Academic Journal of Nawroz University (AJNU) 6 (1), 1-11, 2017 | | 2017 |
Image Forgery Detection Using the Pixel-wise Fragile Image Watermarking Method in Spatial Domains YA Hamza, RR Asaad Academic Journal of Nawroz University (AJNU) 8, 14-25, 2016 | | 2016 |