Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique

Yasmin A. Hassan; Abdul Monem S. Rahma

Volume 23, Issue 3 , September 2023, , Page 186-196

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.15

Abstract
  Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and ...  Read More ...

Computer
A Review: E-voting Security in Mobile Fog computing

Asmaa Ibrahim Hussieen; Abeer Tariq MaoLood; Ekhlas Khalaf Gbash

Volume 23, Issue 1 , March 2023, , Page 57-68

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.5

Abstract
  Conventional voting activities are often replaced by electronic voting (EV) in light of the quick expansion of the Internet. For a variety of reasons, various nations have lately switched to EV rather than conventional voting. Different EV systems were presented up to this point. In both practical and ...  Read More ...

Computer
Image Protection Using Genetic Algorithm and Cipher Technique

Raad Abdul Ameer Qasim; Bashar Saadoon Mahdi

Volume 22, Issue 4 , December 2022, , Page 160-166

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.13

Abstract
  Image Protection is one of the most important issues that have created problems in technology challenges in the past and present years, whether they are stored or when sent to other parties. And how to develop the techniques adopted in encrypting it, devise new methods, or integrate the available technologies ...  Read More ...

Proposed Pseudo Random Generator Based on RC5 Block Cipher

Ashwaq Talib Hashim; Zaid Mundher Radeef

Volume 17, Issue 1 , December 2017, , Page 33-41

Abstract
  Digital cryptography relies greatly on randomness in providing the security requirements imposed by various information systems. Just as different requirements call for specific cryptographic techniques, randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic ...  Read More ...