Articles by B.B. Zaidan (14)

Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review

M.A. Watari, A.A. Zaidan and B.B. Zaidan

Asian Journal of Scientific Research 6 ( 4 ): 632 - 649 , 2013

Commercialization Strategy and Implementation Plans for the Proposed Vitual Anti-Spam System based on Feasibility Study

A.A. Zaidan, M.B. Lakulu, M. Hashim, Mussab Alaa, B.B. Zaidan, O.H. Salman, Bahbibi Rahmatullah and Nazre Abdul Rashid

Asian Journal of Scientific Research 8 ( 3 ): 403 - 412 , 2015

A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm

Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B. Zaidan and A.A. Zaidan

Journal of Applied Sciences 10 ( 1 ): 59 - 64 , 2010

An Accurate Method to Obtain Bio-Metric Measurements for Three Dimensional Skull

S.A. Hameed, B.B. Zaidan, A.A. Zaidan, A.W. Naji and O.F. Tawfiq

Journal of Applied Sciences 10 ( 2 ): 145 - 150 , 2010

Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview

Mohamed Abomhara, Othman O. Khalifa, Omar Zakaria, A.A. Zaidan, B.B. Zaidan and Hamdan O. Alanazi

Journal of Applied Sciences 10 ( 15 ): 1656 - 1661 , 2010

Hiding Data in Video File: An Overview

A.K. Al-Frajat, H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan

Journal of Applied Sciences 10 ( 15 ): 1644 - 1649 , 2010

On the Differences between Hiding Information and Cryptography Techniques: An Overview

B.B. Zaidan, A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab

Journal of Applied Sciences 10 ( 15 ): 1650 - 1655 , 2010

On the Capacity and Security of Steganography Approaches: An Overview

Ali K. Hmood, Hamid A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan

Journal of Applied Sciences 10 ( 16 ): 1825 - 1833 , 2010

Video Compression Techniques: An Overview

M. Abomhara, O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and A. Rame

Journal of Applied Sciences 10 ( 16 ): 1834 - 1840 , 2010

An Overview on Hiding Information Technique in Images

Ali K. Hmood, B.B. Zaidan, A.A. Zaidan and Hamid A. Jalab

Journal of Applied Sciences 10 ( 18 ): 2094 - 2100 , 2010

Investigate the Capability of Applying Hidden Data in Text File: An Overview

A.A. Zaidan, B.B. Zaidan, Ali K. Al-Fraja and Hamid A. Jalab

Journal of Applied Sciences 10 ( 17 ): 1916 - 1922 , 2010

Plagiarized: An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael

A.A. Zaidan, B.B. Zaidan, Ali K. Al-Frajat and Hamid A. Jalab

Journal of Applied Sciences 10 ( 18 ): 2161 - 2167 , 2010

An Automated White Blood Cell Nucleus Localization and Segmentation using Image Arithmetic and Automatic Threshold

H.T. Madhloom, S.A. Kareem, H. Ariffin, A.A. Zaidan, H.O. Alanazi and B.B. Zaidan

Journal of Applied Sciences 10 ( 11 ): 959 - 966 , 2010

Challenges of Hidden Data in the Unused Area Two within Executable Files

A.W. Naji, A.A. Zaidan and B.B. Zaidan

Journal of Computer Science 5 ( 11 ): 890 - 897 , 2009