Developed system for Quran protection using MD5 and Base64
| Main Authors: | A. Ahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, Mohammad Ahmed, Hanady |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20192/ http://irep.iium.edu.my/20192/1/7.pdf |
Similar Items
Protection mechanisms using MD5 and Base64
by: A. Ahmad, Mohammad, et al.
Published: (2011)
by: A. Ahmad, Mohammad, et al.
Published: (2011)
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Developed system for Quran protection using LSB replacement and MD5
by: A. Ahmad, Mohammad, et al.
Published: (2011)
by: A. Ahmad, Mohammad, et al.
Published: (2011)
Protection mechanisms using LSB and MD5
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
The use of genetic algorithm in improving medical image segmentation techniques
by: Hassan, Raini, et al.
Published: (2011)
by: Hassan, Raini, et al.
Published: (2011)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
Molecular docking
by: Abduallah Alsafi, Hassen Mohammed, et al.
Published: (2011)
by: Abduallah Alsafi, Hassen Mohammed, et al.
Published: (2011)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
Analyzing brainwaves while listening to Quranic recitation compared with listening to music based on EEG signals
by: Al-Galal, Sabaa Ahmed Yahya, et al.
Published: (2017)
by: Al-Galal, Sabaa Ahmed Yahya, et al.
Published: (2017)
A framework for evaluating skyline queries over incomplete data
by: Gulzar, Yonis, et al.
Published: (2016)
by: Gulzar, Yonis, et al.
Published: (2016)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new fragile digital watermarking technique for a PDF digital Holy Quran
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Blogging: a new platform for spreading rumors!
by: Zangana, Hewa Majeed, et al.
Published: (2015)
by: Zangana, Hewa Majeed, et al.
Published: (2015)
A study on the effects of EEG and ECG signals while listening to Qur'an recitation
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Sistem siri indeks Al-Quran Surah Al-Fatihah / Herman Md. Tahir
by: Herman , Md. Tahir
Published: (2002)
by: Herman , Md. Tahir
Published: (2002)
Processing skyline queries in incomplete database: issues,
challenges and future trends
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
Identifying skylines in cloud databases with incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
Skyline query processing for incomplete data in cloud environment
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
A web and software-based approach blending social networks for online Qur'anic Arabic learning
by: Abdullah, Matin Saad, et al.
Published: (2017)
by: Abdullah, Matin Saad, et al.
Published: (2017)
Automatic emotion recognition based on EEG and ECG signals while listening to quranic recitation compared with listening to music
by: Ahmed Yahya Al-Galal, Sabaa, et al.
Published: (2016)
by: Ahmed Yahya Al-Galal, Sabaa, et al.
Published: (2016)
An improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
A study on the effects of EEG and ECG signals while listening to Qur’an recitation
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A study on the effects of EEG and ECG signals while listening to Qur'an recitation
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Data Protection Laws
by: Alginahi, Hiba, et al.
Published: (2019)
by: Alginahi, Hiba, et al.
Published: (2019)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Similar Items
-
Protection mechanisms using MD5 and Base64
by: A. Ahmad, Mohammad, et al.
Published: (2011) -
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012) -
Developed system for Quran protection using LSB replacement and MD5
by: A. Ahmad, Mohammad, et al.
Published: (2011) -
Protection mechanisms using LSB and MD5
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012)