Citations in impact factor journals
Real-Time Medical Systems Based on Human Biometric
Steganography: a Systematic Review Journal of Medical Systems Vol. 42, Issue 12, , 2018 |
Sensor-Based mHealth Authentication for Real-Time Remote
Healthcare Monitoring System: A Multilayer Systematic Review Journal of Medical Systems Vol. 43, Issue 2, , 2019 |
Smart Home-based IoT for Real-time and Secure Remote
Health Monitoring of Triage and Priority System using Body Sensors:
Multi-driven Systematic Review Journal of Medical Systems Vol. 43, Issue 3, , 2019 |
Based Medical Systems for Patient’s Authentication: Towards a New
Verification Secure Framework Using CIA Standard Journal of Medical Systems Vol. 43, Issue 7, , 2019 |
Radiological and elemental analysis of well cuttings from Rajian oil field, Potohar Basin, Pakistan Journal of Radioanalytical and Nuclear Chemistry |
Maximizing embedding capacity for speech steganography: a segment-growing approach Multimedia Tools and Applications |
PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture Multimedia Tools and Applications |
64-bit quantization: taking payload capacity of speech steganography to the limits Multimedia Tools and Applications |
Dimensional-analysis and similitude for scale-up of solid-liquid extraction of Eurycoma longifolia roots Chemical Engineering Science |
A transition of a domestic boiler from coal to biomass – Emissions from combustion of raw and torrefied Palm Kernel shells (PKS) Fuel |
Analysis of technical efficiency of dry season rice production in saline and non-saline areas of Bangladesh Journal of Environmental Management |
Pelagic seabirds as biomonitors of persistent organic pollutants in the Southwestern Atlantic Marine Pollution Bulletin |
Comparative Study on the Evaluation and Benchmarking Information
Hiding Approaches Based Multi-Measurement Analysis Using TOPSIS Method with
Different Normalisation, Separation and Context Techniques Measurement |
Beekeeping and honey bee colony health: A review and conceptualization of beekeeping management practices implemented in Europe Science of The Total Environment |
Negligible effect of potentially toxic elements and rare earth elements on mercury removal from contaminated waters by green, brown and red living marine macroalgae Science of The Total Environment |
Analysis of landfill design variables based on scientific computing Waste Management |
Closure of sets: a statistically hypersensitive system for steganalysis of least significant bit embedding IET Signal Processing Vol. 5, Issue 4, 379, 2011 |
Sorption Behavior and Mechanism of Pb(II) on Chinese Loess Journal of Environmental Engineering Vol. 135, Issue 1, 58, 2009 |
Comprehensive Review of Seven Plant Seed Oils: Chemical Composition, Nutritional Properties, and Biomedical Functions Food Reviews International |
Plant‐associated endophytic fungi as potential bio‐factories for extracellular enzymes: Progress, Challenges and Strain improvement with precision approaches Journal of Applied Microbiology Vol. 133, Issue 2, 287, 2022 |
Lactococcus lactis
subsp
lactis
CRL1655
and
Schleiferilactobacillus perolens
CRL1724
inhibit the adherence of common bovine mastitis pathogens to mammary gland cells, without causing histological changes in the mammary gland Journal of Applied Microbiology Vol. 133, Issue 2, 733, 2022 |
Secure Topology for Electronic Medical Record Transmissions International Journal of Pharmacology Vol. 6, Issue 6, 954, 2010 |
Computerized Algorithm for Fetal Heart Rate Baseline and Baseline Variability Estimation based on Distance Between Signal Average and a Value International Journal of Pharmacology Vol. 7, Issue 2, 228, 2011 |
Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns International Journal of Pharmacology Vol. 7, Issue 3, 382, 2011 |
Citation to this article as recorded by
Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649. CrossRefDirect Link |
Alanizi, H.O., M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan and G.M. Alam, 2010. Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958. CrossRefDirect Link |
Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100. CrossRefDirect Link |
Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833. CrossRefDirect Link |
Li, Y.W. and W. Hong, 2012. An improved reversible data hiding method using alternative location map embedment strategy. Inform. Technol. J., 11: 1109-1114. CrossRefDirect Link |
Nabi, M.S.A., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and G.M. Alam, 2010. Suitability of using SOAP protocol to secure electronic medical record databases transmission. Int. J. Pharmacol., 6: 959-964. CrossRefDirect Link |
Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Purposeful error on OFDM: A secret channel. Inform. Technol. J., 13: 1985-1991. CrossRefDirect Link |
Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Sub carriers carry secret: An absolute stego approach. J. Applied Sci., 14: 1728-1735. CrossRefDirect Link |
Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152. CrossRefDirect Link |
Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46. CrossRefDirect Link |
Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and H.A. Jalab, 2010. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922. CrossRefDirect Link |
Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010. Novel approach for high (Secure and rate) data hidden within triplex space for executable file. Sci. Res. Essays, 5: 1965-1977. Direct Link |
Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010. Novel approach for high (Secure and rate) data hidden within triplex space for executable file. Sci. Res. Essays, 5: 1965-1977. Direct Link |
Zaidan, B.B., A.A. Zaidan and M.L.M. Kiah, 2011. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol., 7: 382-387. CrossRefDirect Link |
Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655. CrossRefDirect Link |
Zeki, A.M., A.A. Manaf and S.S. Mahmod, 2011. High watermarking capacity based on spatial domain technique. Inform. Technol. J., 10: 1367-1373. CrossRef |
Zhao, Z., G. Kang and R. Guo, 2012. Reversible data hiding based on orthogonal prediction error modification and multilevel histogram shifting. Inform. Technol. J., 11: 1077-1083. CrossRef |
Citation to this article as recorded by
Effects of water‐deficit stress and putrescine on performances, photosynthetic gas exchange, and chlorophyll fluorescence parameters of
Salvia officinalis
in two cutting times Food Science & Nutrition Vol. 10, Issue 5, 1431, 2022 |
Lactic acid bacteria isolated from Kazakh traditional fermented milk products affect the fermentation characteristics and sensory qualities of yogurt Food Science & Nutrition Vol. 10, Issue 5, 1451, 2022 |
Spectrum–effect relationship between ultra‐high‐performance liquid chromatography fingerprints and antioxidant activities of
Lophatherum gracile
Brongn Food Science & Nutrition Vol. 10, Issue 5, 1592, 2022 |
A new digital watermarking evaluation and benchmarking
methodology using an external group of evaluators and multi-criteria analysis
based on ‘large-scale data’ Software: Practice and Experience Vol. 47, Issue 10, 1365, 2017 |
The interaction effects of an instructor’s emotions in instructional videos and students’ emotional intelligence on L2 vocabulary learning Educational technology research and development |
Electronic medical record systems: decision support
examination framework for individual, security and privacy concerns using
multi-perspective analysis Health and Technology |
A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security SN Computer Science Vol. 3, Issue 2, , 2022 |
A comprehensive survey of covert communication techniques, limitations and future challenges Computers & Security |
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art Computer Science Review |
Backward movement oriented shark smell optimization-based audio steganography using encryption and compression strategies Digital Signal Processing |
Green microalgal strain Chlorella vulgaris isolated from industrial wastewater with remediation capacity Environmental Technology & Innovation |
Arsenic in Africa: Potential sources, spatial variability, and the state of the art for arsenic removal using locally available materials Groundwater for Sustainable Development |
Cape gooseberry Petit Suisse Cheese incorporated with moringa leaf powder and gelatin LWT |
Aloe vera gel attenuates acetic acid-induced ulcerative colitis in adult male Wistar rats Toxicology Reports |
Kambo: Natural drug or potential toxic agent? A literature review of acute poisoning cases Toxicology Reports |
Predictive MERRA-2 aerosol diagnostic model for oral, oropharyngeal and laryngeal cancer caused by air pollution in Thai population Toxicology Reports |
A new generalization of logistic Weibull distribution with theory and practical illustration Journal of Statistics and Management Systems Vol. 25, Issue 4, 781, 2022 |
Effect on physiological parameters and semen quality upon oral administration of fresh onion juice to V-line rabbit buck during severe heat stress Animal Biotechnology |
The Progressive Multilevel Embedding Method for Audio Steganography Journal of Physics: Conference Series Vol. 1551, Issue 1, 012011, 2020 |
The Adaptive Multi-Level Phase Coding Method in Audio Steganography IEEE Access |
New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity IEEE Access |
Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network Architectures IEEE Access |
Software and Hardware FPGA-Based Digital Watermarking and
Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking
Using Multi-Criteria Decision-Making Techniques Journal of Circuits, Systems and Computers |
A Systematic Review on Smartphone Skin Cancer Apps: Coherent
Taxonomy, Motivations, Open Challenges and Recommendations, and New Research
Direction Journal of Circuits, Systems and Computers |
Comparative study of digital audio steganography
techniques EURASIP Journal on Audio, Speech, and Music Processing Vol. 2012, Issue 1, , 2012 |
Phytotoxicological study of selected poisonous plants from Azad Jammu & Kashmir PLOS ONE Vol. 17, Issue 5, e0263605, 2022 |
High Watermarking Capacity Based on Spatial Domain Technique Information Technology Journal Vol. 10, Issue 7, 1367, 2011 |
Hiding data in video file: An overview. Journal of Applied Sciences Vol. 10, Issue 15, 1644, 2010 |
On the Differences between Hiding Information and Cryptography Techniques: An Overview Journal of Applied Sciences Vol. 10, Issue 15, 1650, 2010 |
On the Capacity and Security of Steganography Approaches: An Overview Journal of Applied Sciences Vol. 10, Issue 16, 1825, 2010 |
Investigate the capability of applying hidden data in text file: An overview. Journal of Applied Sciences Vol. 10, Issue 17, 1916, 2010 |
An Overview on Hiding Information Technique in Images Journal of Applied Sciences Vol. 10, Issue 18, 2094, 2010 |
A Review on Multimedia Communications Cryptography Research Journal of Information Technology Vol. 3, Issue 3, 146, 2011 |
OFDM+CDMA+Stego = Secure Communication: A Review Research Journal of Information Technology Vol. 4, Issue 2, 31, 2012 |
A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography Pertanika Journal of Science and Technology Vol. 30, Issue 1, 497, 2022 |
How to cite this article
Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. Journal of Applied Sciences, 10: 59-64.
DOI: 10.3923/jas.2010.59.64
URL: https://scialert.net/abstract/?doi=jas.2010.59.64
DOI: 10.3923/jas.2010.59.64
URL: https://scialert.net/abstract/?doi=jas.2010.59.64