Your search returned 30 results. Subscribe to this search

|
21. Enhancing open space method in data hiding technique - text under text / by abdallah, yaman fakhri issa . Publication: . 98 P. Availability: No items available:

22. Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator Method / by Sarayreh, Ghaith Salem . Publication: Amman : 2014 . 60 P. Date: 2014 Availability: No items available:

23. New Method for Image Inside Image Steganography / by Faleh, Ahmad . Publication: Amman : 2014 . 68 P. Date: 2014 Availability: No items available:

24. Text Image steganography Using LSD Method / by Ahmad, Jalal . Publication: Amman : 2014 . 53 P. Date: 2014 Availability: No items available:

25. new techniqure to embed encrypted or code in colored image by using first and third lsb / by abdulrahman, muataz safauldeen . Publication: amman : 2001 . 73 P. Date: 2001 Availability: No items available:

26. An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection / by , Shatha Abd . Publication: Amman : 2014 . 90 P. Date: 2014 Availability: No items available:

27. An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data / by Al, Abdullah Osamah . Publication: Amman : 2014 . 80 P. Date: 2014 Availability: No items available:

28. A secure Home Appliiances Remote Control Model / by Jasim, Mohammed Mohammed . Publication: Amman : 2014 . 65 P. Date: 2014 Availability: No items available:

29. Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms / by Abdulraheem, Waleed Khaled Amin . Publication: Amman : 2014 . 100 P. Date: 2014 Availability: No items available:

30. Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network / by Al, Ahmed Shihab Ahmed . Publication: Amman : 2015 . 96 P. Date: 2015 Availability: No items available:

Powered by Koha