Biometric identity authentication system using hand geometry measurements HH Mohammed, SA Baker, AS Nori Journal of Physics: Conference Series 1804 (1), 012144, 2021 | 20 | 2021 |
Design and implementation of Threefish cipher algorithm in PNG file AS Nori, AO Abdulmajeed Sustainable Engineering and Innovation 3 (2), 79-91, 2021 | 9 | 2021 |
An Investigation for Steganography using Different Color System AB Sallow, ZM Taha, AS Nori AL-Rafidain Journal of Computer Sciences and Mathematics 7 (3), 91-108, 2010 | 9 | 2010 |
Internet of things security: a survey SA Baker, AS Nori Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | 8 | 2021 |
Steganography in mobile phone over bluetooth S Baker, A Nori International Journal of Information Technology and Business Management …, 2013 | 8 | 2013 |
Honey Encryption Security Techniques: A Review Paper AAM Gharbi, AS Nori AL-Rafidain Journal of Computer Sciences and Mathematics 16 (1), 1-14, 2022 | 2 | 2022 |
Improve Security Using Steganography and Cryptography Based on Smartphone Users Locations AM Ahmed, AS Nori 2022 Second International Conference on Advances in Electrical, Computing …, 2022 | 2 | 2022 |
Steganography Method of the Bigger Size in WebP Image Using M2PAM Algorithm for Social Applications OA Najm, AS Nori Turkish Journal of Computer and Mathematics Education (TURCOMAT) 13 (2), 595-610, 2022 | 2 | 2022 |
A secure proof of work to enhance scalability and transaction speed in blockchain technology for IoT SA Baker, AS Nori AIP Conference Proceedings 2830 (1), 2023 | 1 | 2023 |
Lightweight Authentication for Devices in Internet of Thing Environment: A Survey S Abbas Fadhel, AS Sami Nori AL-Rafidain Journal of Computer Sciences and Mathematics 17 (2), 55-62, 2023 | | 2023 |
An Evaluation Review of Steganography Using a Hybrid Method Technique of Quad Chain Code and Discrete Shearlet Transform MMM Fathel, AS Nori International Research Journal of Innovations in Engineering and Technology …, 2023 | | 2023 |
Improving Security Using Cryptography Based on Smartphone User Locations AS Nori Journal of Education and Science 31 (2), 94-104, 2022 | | 2022 |
A Comparison of the Randomness Analysis of the Modified Rectangle Block Cipher and Original algorithm SA Baker, AS Nori NTU Journal of Pure Sciences 1 (2), 10-21, 2022 | | 2022 |
Blind Steganalysis using One-Class Classification AS Nori AL-Rafidain Journal of Computer Sciences and Mathematics 13 (2), 2019 | | 2019 |
Information Hiding in Color Image based on LSB and FA AS Nori, J Ibrahim Jasim Kirkuk Journal of Science 12 (3), 361-376, 2017 | | 2017 |
Data Hiding over Mobile Phones using Socket Network Communication AS Nori, SA Baker International Journal of Computer Science Issues (IJCSI) 10 (6), 201, 2013 | | 2013 |
Steganography based on Vector Quantization Technique A Osamah, AS Nori AL-Rafidain Journal of Computer Sciences and Mathematics 10 (3), 13-27, 2013 | | 2013 |
Hiding Information using Replacement in Silent Mutation of DNA Sequences SH Abdullah, AS Nori AL-Rafidain Journal of Computer Sciences and Mathematics 10 (2), 113-134, 2013 | | 2013 |
GLM for Image Steganography Technique AS Nori, NN Ahmed, TG Ahmed AL-Rafidain Journal of Computer Sciences and Mathematics 10 (1), 239-249, 2013 | | 2013 |
DNA Sequences as a Medium for Steganography Method of Codon Frequency with Character Frequency SH Abdullah, AS Nori AL-Rafidain Journal of Computer Sciences and Mathematics 9 (2), 99-112, 2012 | | 2012 |