Dalal N. Hammod
YOU?
Author Swipe
View article: A Review of Reversible Data Hiding-Encrypted Image (RDH-EI) Methods
A Review of Reversible Data Hiding-Encrypted Image (RDH-EI) Methods Open
In the past few years, the world had witnessed a revolution in multimedia and Information Technology (IT) development and utilization. This results from the increase of the internet-based-communications including the transfer of the digita…
View article: Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI) Open
This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when reso…
View article: Message Authentication Using New Hash Function
Message Authentication Using New Hash Function Open
In cryptography, hash functions have very important effects when it's used in the message integrity, digital time stamping, and digital signature.Hash functions compute hash value by a set of logical (primitive) operations that perform on …
View article: An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm
An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm Open
There are two very important characteristics in the block cipher, the amount of time for encryption process and key complexity which caused increasing the complexity of encryption process. This research aims to enhance the key generation o…