title : Professor
College : Education for Pure Sciences
Department : Computer Science
Email : Iman.abduljaleel@uobasrah.edu.iq
Title of Search | Type | Publisher | year | Global | Single | Thompson Reuters (Clarivate) th> | Scopes | Download |
---|---|---|---|---|---|---|---|---|
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism | Journal | PLOS ONE | 2024 | |||||
A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids | Journal | Cryptography | 2024 | |||||
Deep Sentiment Analysis System with Attention Mechanism for the COVID-19 Vaccine | Journal | Tem Journal | 2024 | |||||
Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance | Journal | PLOS ONE | 2024 | |||||
A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client | Journal | PLOS ONE | 2024 | |||||
Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems | Journal | Applied Sciences | 2023 | |||||
Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes | Journal | Applied Sciences | 2022 | |||||
Optimized Hysteresis Region Authenticated Handover for 5G HetNets | Chapter | Artificial Intelligence and Sustainable Computing | 2022 | |||||
A Lightweight Hybrid Scheme for Hiding TextMessages in Colour Images Using LSB, Lah Transformand Chaotic Techniques | Journal | Journal of Sensor and Actuator Networks | 2022 | |||||
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping | Journal | IEEE Access | 2022 | |||||
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids | Journal | Springer Nature Switzerland AG 2022 | 2022 | |||||
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks | Journal | Journal of Sensor and Actuator Networks | 2022 | |||||
Speech Encryption Technique using S - box based on Multi Chaotic Maps | Journal | TEM Journal | 2021 | |||||
Speech signal compression and encryption based on sudoku, fuzzy C-means and threefish cipher | Journal | International Journal of Electrical and Computer Engineering (IJECE) | 2021 | |||||
An Image of Encryption Algorithm Using Graph Theory and Speech Signal Key Generation | Conference | IOP | 2021 | |||||
Secure image hiding in speech signal by steganography-mining and encryption | Journal | Indonesian Journal of Electrical Engineering and Computer Science | 2021 | |||||
Towards Security and Privacy Preservation in 5G Networks | Conference | Telecommunications forum TELFOR | 2021 | |||||
Significant Medical Image Compression Techniques: A Review | Journal | TELKOMNIKA Telecommunication, Computing, Electronics and Control | 2021 | |||||
Hide Medical Images in a Speech Signal using DNA Coding and Fuzzy C-Means | Conference | IEEE | 2021 | |||||
CHAOTIC IMAGE CRYPTOGRAPHY SYSTEMS: A REVIEW | Journal | مجلة سامراء للعلوم الصرفة | 2021 | |||||
Hiding text in speech signal using K-means, LSB techniques and chaotic maps | Journal | International Journal of Electrical and Computer Engineering | 2020 | |||||
A novel technique for speech encryption based on k-means clustering and quantum chaotic map | Journal | Bulletin of Electrical Engineering and Informatics | 2020 | |||||
Color Image Encryption using Chaotic Maps, Triangular Scrambling, with DNA Sequences | Journal | IEEE | 2017 | |||||
Leaf Recognition based on Neural Network Feed-Forward and Support Vector Machine Classifiers | Journal | International Journal of computer Science and Mobile Computing | 2017 | |||||
Analysis of a Modified on Rivets Cipher (RC4) Algorithm by Chaotic Algorithm | Journal | Journal of College of Education / Wasit, Volume 1, Issue 27, Pages 473-484 | 2017 | |||||
Hiding a medical image in an audio file Using (Curvelet / IWT) transforms and modified LBS method | Journal | مجلة البصرة للعلوم | 2016 | |||||
Using IWT and LSB Method to Hide Encrypted image in Color image | Journal | مجلة ابحاث البصرة - العلميات | 2016 | |||||
Proposed Image Encryption Algorithm Using Block Rotation And Elliptic Curve Cryptography | Journal | مجلة ميسان للدراسات الاكاديمية | 2014 | |||||
Speech encryption using Chaotic Map and Blowfish Algorithms | Journal | مجله ابحاث البصرة-العلميات | 2013 | |||||
Hybrid Proposed Method Using Statistical Linguistic Features (SLF) And Neural Network In Arabic Texts Summarization | Journal | مجلة البصرة للعلوم | 2013 | |||||
Isolated handwritten Arabic Optical Character Recognition (IHAOCR) using Wavelet\Curvelet Feature Extraction | Journal | مجله القادسيه لعلوم الحاسوب والرياضيات | 2012 | |||||
Comparing Study Using DWT/CT transform in image Denoising process | Journal | مجلة البصرة للعلوم | 2012 | |||||
Speech encryption Technique based on Bio-Chaotic Algorithm | Journal | مجلة المنصور,عدد 17 | 2012 | |||||
خوارزمية مقترحة لتحديد زاوية انحراف النصوص العربية المكتوبة يدويا باستخدام تحويليHough \ Radon | Journal | مجلة الرياضيات والحاسبات \ جامعة القادسية \ العدد 1 | 2011 | |||||
التمييــــــز الآلــــي لمخطـــــوطات برايـــــــل العــــــربية | Journal | مجلة الرياضيات والحاسبات \ جامعة الكوفة\ العدد 3 | 2011 | |||||
Speech Analysis Technique For Speech Compression | Journal | i-manager's Journal on Software Engineering | 2011 | |||||
An Automatic Recognizer for Iraqi License Plates Using ELMAN Neural Network | Journal | J. Software Engineering & Applications | 2010 |