Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Image Encryption Paillier Homomorphic Cryptosystem

Zainab Mohammed Muneef; Hala bahjat; Abdulmohsen Jaber Abdulhoseen

Volume 21, Issue 4 , December 2021, , Page 29-36

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.3

Abstract
  With the increasing use of media in communications, both academia and industry pay attention to the content security of digital images. This research presents a Homomorphic cryptosystem-based asymmetric picture encryption technique (Paillier). The algorithm is used for securing images that transmit over ...  Read More ...

3D Textured Model Encryption Using 2D Logistic and 3D Lorenz Chaotic Map

Nashwan Alsalam Ali; Abdul Monem S Rahma; Shaimaa h. Shaker

Volume 21, Issue 4 , December 2021, , Page 90-103

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.9

Abstract
  The widespread of recent multimedia, including various 3D model applications in different domains of areas, may lead to 3D models being stolen and attacked by hackers. Moreover, 3D models must be protected from unauthorized users and when transmitting over the internet. Nowadays the 3D model protection ...  Read More ...

A Development of Least Significant Bit Steganography Technique

Mohammed Majid Msallam

Volume 20, Issue 1 , January 2020, , Page 31-39

Abstract
  Recently, the world has been interested in transferring data between different devices. The transmission of data must be encrypted so that the intended receiver can only read and process a secret message. Hence, the security of information has become more important than earlier. This paper proposes the ...  Read More ...