Information hiding using LSB technique based on developed PSO algorithm WA Shukur, KK Jabbar International Journal of Electrical and Computer Engineering 8 (2), 1156, 2018 | 20 | 2018 |
IMAGE ENCRYPTION BASED ON THE NOVEL 5D HYPER-CHAOTIC SYSTEM VIA IMPROVED AES ALGORITHM FHA Sadiq A. Mehdi, Khalid Kadhim Jabbar International Journal of Civil Engineering and Technology 9 (10), 1841-1855, 2018 | 17 | 2018 |
Compare between DCT and DWT for digital watermarking in color image KK Jabbar, MB Tuieb Compare 5 (7), 2015 | 7 | 2015 |
Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network RS Mohammed, KK Jabbar, HA Hilal International Journal of Electrical and Computer Engineering (IJECE) 11 (4 …, 2021 | 6 | 2021 |
Property Comparison of Intellectual Property Rights of Image-Based on Encryption Techniques. KK Jabbar, F Ghozzi, A Fakhfakh TEM Journal 12 (1), 2023 | 5 | 2023 |
Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit KK Jabbar, MB Tuieb, SA Thajeel International Journal of Electrical and Computer Engineering (IJECE) 12 (6 …, 2022 | 4 | 2022 |
TEXT CRYPTOGRAPHY USING MULTIPLE ENCRYPTION ALGORITHMS BASED ON CIRCULAR QUEUE VIA CLOUD COMPUTING ENVIRONMENT. KK JABBAR, HABD HILAL, RS MOHAMMED Journal of Theoretical & Applied Information Technology 96 (12), 2018 | 4 | 2018 |
A Proposed Hybrid Text Cryptographic Method Using Circular Queue LKQ Wisam Abed Shukur , Khalid Kadhim Jabbar International Journal of Civil Engineering and Technology (IJCIET) 9 (7 …, 2018 | 4* | 2018 |
Frequency domain for color image authentication proofing SK Gaid, KK Jabbar Journal of Physics: Conference Series 1963 (1), 012094, 2021 | 3 | 2021 |
Image authentication subject review KK Jabbar International Journal of Engineering Research and Advanced Technology …, 2018 | 2 | 2018 |
The Optimal Hiding Site with DCT KK Jabbar University of Al-Mustansiriya, College of Education, Computer Science …, 2014 | 1 | 2014 |
Image Encryption Performance Analysis Using Reversible Logic Gates KK Jabbar, F Ghozzi, A Fakhfakh Mustansiriyah Journal of Pure and Applied Sciences 2 (1), 93–103-93–103, 2024 | | 2024 |
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach KK Jabbar, F Ghozzi, A Fakhfakh Baghdad Science Journal 20 (6 (Suppl.)), 2593-2593, 2023 | | 2023 |
Information security based on sub-system keys generator by utilizing polynomials method and logic gate KKJHAHAT Naser Journal of Discrete Mathematical Sciences and Cryptography 26 (4), pp. 1135–1143, 2023 | | 2023 |
VPN Development Based on IPSec Protocols Suit MB Tuieb, KK Jabbar Al-Mustansiriyah Journal of Science 27 (1), 2016 | | 2016 |
Information security based on sub-system keys generator by utilizing polynomials method and logic gate KK Jabbar, HA Hailal, AT Naser | | |