Follow
Ahmed S. Nori
Ahmed S. Nori
University of Mosul, College of Computer Science and Mathematics
Verified email at uomosul.edu.iq
Title
Cited by
Cited by
Year
Biometric identity authentication system using hand geometry measurements
HH Mohammed, SA Baker, AS Nori
Journal of Physics: Conference Series 1804 (1), 012144, 2021
242021
Design and implementation of Threefish cipher algorithm in PNG file
AS Nori, AO Abdulmajeed
Sustainable Engineering and Innovation 3 (2), 79-91, 2021
102021
Internet of things security: a survey
SA Baker, AS Nori
Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021
102021
An Investigation for Steganography using Different Color System
A Sallow, Z Taha, A Nori
AL-Rafidain Journal of Computer Sciences and Mathematics 7 (3), 91-108, 2010
92010
Steganography in mobile phone over bluetooth
S Baker, A Nori
International Journal of Information Technology and Business Management …, 2013
82013
A secure proof of work to enhance scalability and transaction speed in blockchain technology for IoT
SA Baker, AS Nori
AIP Conference Proceedings 2830 (1), 2023
22023
Honey Encryption Security Techniques: A Review Paper
A Gharbi, A Nori
AL-Rafidain Journal of Computer Sciences and Mathematics 16 (1), 1-14, 2022
22022
Improve Security Using Steganography and Cryptography Based on Smartphone Users Locations
AM Ahmed, AS Nori
2022 Second International Conference on Advances in Electrical, Computing …, 2022
22022
Steganography Method of the Bigger Size in WebP Image Using M2PAM Algorithm for Social Applications
OA Najm, AS Nori
Turkish Journal of Computer and Mathematics Education (TURCOMAT) 13 (2), 595-610, 2022
22022
Lightweight Authentication for Devices in Internet of Thing Environment: A Survey
SA Fadhel, AS Nori
AL-Rafidain Journal of Computer Sciences and Mathematics 17 (2), 55-62, 2023
12023
Modern steganography method based on Shearlet transformation with quad chain code
MM Mohamed, AS Nori
AIP Conference Proceedings 3219 (1), 2024
2024
Review “The Digital Revolution for the Security of Hiding Information inside the Quick Response Code”
AZ Younis, AS Nori
International Research Journal of Innovations in Engineering and Technology …, 2024
2024
LAM-IoT: Lightweight Authentication Model for monitoring systems in IoT-enabled smart homes based on DID using IOTA
SA Fadhel, AS Nori
International Journal of Computing and Digital Systems 16 (1), 1-15, 2024
2024
Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
OA Najm, A Nori
Al-Rafidain Journal of Computer Sciences and Mathematics 18 (1), 125-130, 2024
2024
An Evaluation Review of Steganography Using a Hybrid Method Technique of Quad Chain Code and Discrete Shearlet Transform
MMM Fathel, AS Nori
International Research Journal of Innovations in Engineering and Technology …, 2023
2023
Improving Security Using Cryptography Based on Smartphone User Locations
A Nori
Journal of Education and Science 31 (2), 94.0-104.0, 2022
2022
A Comparison of the Randomness Analysis of the Modified Rectangle Block Cipher and Original algorithm
SA Baker, AS Nori
NTU Journal of Pure Sciences 1 (2), 10-21, 2022
2022
Blind Steganalysis using One-Class Classification
AS Nori
AL-Rafidain Journal of Computer Sciences and Mathematics 13 (2), 2019
2019
Information Hiding in Color Image based on LSB and FA
AS Nori, J Ibrahim Jasim
Kirkuk Journal of Science 12 (3), 361-376, 2017
2017
Data Hiding over Mobile Phones using Socket Network Communication
AS Nori, SA Baker
International Journal of Computer Science Issues (IJCSI) 10 (6), 201, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20