Search Results - "Hassan, Nidaa Flaih"
-
1
Real-Time Hand Gesture Recognition: A Comprehensive Review of Techniques, Applications, and Challenges
Published in Cybernetics and information technologies : CIT (01-09-2024)“…Real-time Hand Gesture Recognition (HGR) has emerged as a vital technology in human-computer interaction, offering intuitive and natural ways for users to…”
Get full text
Journal Article -
2
Classification of gender face image based on slantlet transform
Published in Engineering and Technology Journal (01-04-2016)“…Image Face classification has been an effective research area over last two or three decades and it is considered as a challenging research topic. In this…”
Get full text
Journal Article -
3
A SUGGESTED SUPER SALSA STREAM CIPHER
Published in Iraqi journal for computers and informatics (Online) (31-12-2018)Get full text
Journal Article -
4
Robust Watermarking in Video using Discrete Cosine Transform and Facial Landmarks
Published in 2022 Fifth College of Science International Conference of Recent Trends in Information Technology (CSCTIT) (15-11-2022)“…As multimedia has developed, digital video watermarking technology has become widely acknowledged as a crucial tool for copyright enforcement. In this paper, a…”
Get full text
Conference Proceeding -
5
A SUGGESTED SUPER SALSA STREAM CIPHER
Published in Iraqi journal for computers and informatics (Online) (01-12-2018)“…Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specified for apps wherever the grade of security…”
Get full text
Journal Article -
6
Proposed color Image Lightweight Encryption Using Salsa20 with Key Derivation Function
Published in Majallat Baghdād lil-ʻulūm (19-07-2024)“…نظرًا للتطور الاستثنائي في إنتاج وتبادل الوسائط المتعددة عبر الشبكات غير المحمية، اصبحت الحاجة لتطوير خوارزميات تشفير موثوقة وآمنة وفعالة أكبر. تقترح هذه…”
Get full text
Journal Article -
7
Image categorization based color detector
Published in Engineering and Technology Journal (01-05-2016)“…Due to the investigation of the images in several parts of the life and the arising of the fast technology make the management of these images an open research…”
Get full text
Journal Article -
8
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
Published in Majallat Baghdād lil-ʻulūm (19-12-2018)“…Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm…”
Get full text
Journal Article -
9
Encryption Edge Points in Face using Light Stream Algorithm
Published in 2022 3rd Information Technology To Enhance e-learning and Other Application (IT-ELA) (27-12-2022)“…Unauthorized sharing and data theft represent a huge challenge for everyone, especially for companies and sensitive governmental institutions, where the videos…”
Get full text
Conference Proceeding -
10
Proposing a Scheme for Human Interactive Proof Test using Plasma Effect
Published in Majallat Baghdād lil-ʻulūm (02-06-2019)“… Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer…”
Get full text
Journal Article -
11
Partial Face Encryption Based on CAT Swarm Optimization
Published in 2022 2nd International Conference on Advances in Engineering Science and Technology (AEST) (24-10-2022)“…Videos are vulnerable to file hacking and unauthorized sharing or data loss. Many protect unauthorized viewing of video material via video encryption. The…”
Get full text
Conference Proceeding