Copyright Authentication By Using Karhunen-Loeve Transform
Copyright Authentication By Using Karhunen-Loeve Transform

Ghada Thanon Yuonis; Sundus Khaleel Ebraheem; Khalil I. Al

Volume 6, Issue 2 , August 2012, , Page 50-57

https://doi.org/10.37652/juaps.2012.63238

Abstract
  Authentication is a raised as one of the important subject in field of security. So many techniques for improving authentication were appeared during the last three decades.This paper ...  Read More ...
Data Hiding In Contourlet Coefficients Based On Their Energy
Data Hiding In Contourlet Coefficients Based On Their Energy

Khalil I. Alsaif; Nagham S. AL-lella

Volume 6, Issue 2 , August 2012, , Page 109-123

https://doi.org/10.37652/juaps.2012.63368

Abstract
  The data hiding is one of the most important subject in field of computer science, so a lot of technique was developed and modified to satisfy the optimum lend of hiding. In this research ...  Read More ...
Gout Images Detection and Recognition by Neural Network
Gout Images Detection and Recognition by Neural Network

Hind Rostom Mohammed

Volume 5, Issue 2 , August 2011, , Page 103-108

https://doi.org/10.37652/juaps.2011.44190

Abstract
  Gout skin detection and tracking has been the topics of an extensive research for the several past decades. Many heuristic and pattern recognition based strategies have been proposed ...  Read More ...
A New Steganography Approach depending on Isolation Curve in Digital Images.
A New Steganography Approach depending on Isolation Curve in Digital Images.

Hala Bahjat Abdul Wahab

Volume 3, Issue 1 , April 2009, , Page 161-167

https://doi.org/10.37652/juaps.2009.15400

Abstract
  result, protecting the whole document from being regenerated by any counterfeiting person. The main goal of this paper is combining the curve security concepts with information hiding ...  Read More ...