Protection of the digital holy Quran using IT techniques
| Main Authors: | Alahmad, Mohammad, Taha Alshaikhli, Imad Fakhri |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
IIUM Press, International Islamic University Malaysia
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/70595/ http://irep.iium.edu.my/70595/1/70595_Protection%20of%20the%20digital%20holy%20Quran%20using%20it%20techniques.pdf |
Similar Items
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
A new fragile digital watermarking technique for a PDF digital Holy Quran
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
A novel approach towards tamper detection of digital holy Quran generation
by: Islam, Md. Milon, et al.
Published: (2020)
by: Islam, Md. Milon, et al.
Published: (2020)
Integrated modalities search framework for digital english language text Holy Qur’an and Tafsir
by: Qushem, Umar, et al.
Published: (2017)
by: Qushem, Umar, et al.
Published: (2017)
Detection of cracked digitized paintings and manuscripts
based on threshold techniques
by: abdulwahab, Nawafil, et al.
Published: (2019)
by: abdulwahab, Nawafil, et al.
Published: (2019)
Multicollisions in sponge construction
by: Alahmad, Mohammad A., et al.
Published: (2013)
by: Alahmad, Mohammad A., et al.
Published: (2013)
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
A study on the effects of EEG and ECG signals while listening to Qur'an recitation
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Detection and restoration of cracked digitized paintings and
manuscripts using image processing - a survey
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
Kuwait government entities e-business continuity and
disaster recovery plan
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
SVG and Arabic font challenges and improvements
by: Taha, Imad, et al.
Published: (2013)
by: Taha, Imad, et al.
Published: (2013)
CERT Technologies
by: Alenezi, Khalid, et al.
Published: (2015)
by: Alenezi, Khalid, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
Achieving security by combining Huffman and SLSB algorithms
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
A scientific review of soft-computing techniques and methods
for stock market prediction
by: Islam, Muhammad Rabiul, et al.
Published: (2018)
by: Islam, Muhammad Rabiul, et al.
Published: (2018)
Developed system for Quran protection using MD5 and Base64
by: A. Ahmad, Mohammad, et al.
Published: (2011)
by: A. Ahmad, Mohammad, et al.
Published: (2011)
CERT team involving GEs structured
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new algorithm for human face detection using skin color tone
by: Zangana, Hewa Majeed, et al.
Published: (2013)
by: Zangana, Hewa Majeed, et al.
Published: (2013)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
EEG-based emotion recognition while listening to Quran recitation compared with relaxing music using Valence-arousal model
by: Al-Galal, Sabaa Ahmed Yahya, et al.
Published: (2016)
by: Al-Galal, Sabaa Ahmed Yahya, et al.
Published: (2016)
Protecting an Internet Web File using Java
by: Taha, Imad, et al.
Published: (2004)
by: Taha, Imad, et al.
Published: (2004)
A framework of meaningful sharing behavior of authentic holy Quran content on facebook / Suraya Ika Tamrin
by: Suraya Ika , Tamrin
Published: (2021)
by: Suraya Ika , Tamrin
Published: (2021)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Similar Items
-
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013) -
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013) -
A new fragile digital watermarking technique for a PDF digital Holy Quran
by: Alahmad, Mohammad, et al.
Published: (2013) -
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019) -
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)