Follow
Lahieb Mohammed Jawad
Lahieb Mohammed Jawad
Asst. Prof. Dr., Computer Networks Engineering Dept.,College of Information Engineering, Al- Nahrain
Verified email at ced.nahrainuniv.edu.iq - Homepage
Title
Cited by
Cited by
Year
Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption
LM Jawad, G Sulong
Nonlinear Dynamics 81 (4), 2079-2093, 2015
322015
A review of color image encryption techniques
LM Jawad, GB Sulong
International Journal of Computer Science Issues (IJCSI) 10 (6), 266, 2013
252013
A new scan pattern method for color image encryption based on 3D-Lorenzo chaotic map method
LM Jawad
Multimedia Tools and Applications, 2021
122021
AN EFFECTIVE COLOR IMAGE ENCRYPTION SCHEME BASED ON DOUBLE PIECEWISE LINEAR CHAOTIC MAP METHOD AND RC4 ALGORITHM
LM JAWAD, TM JAWAD, DW AHMED
Journal of Engineering Science and Technology 16 (2), 1319 - 1341, 2021
102021
A novel dynamic secret key generation for an efficient image encryption algorithm
LM Jawad, G Sulong
Modern Applied Science 9 (13), 85, 2015
102015
A survey on emerging challenges in selective color image encryption techniques
LM Jawad, G Sulong
Indian Journal of Science and Technology 8 (27), 1-12, 2015
102015
Secure Image Encryption Scheme Using Chaotic Maps and RC4 Algorithm
LM Jawad, R Mohammed
Solid State Technology 63 (3), 3465-3449, 2020
72020
Electronic Student Attendance Management System Based on ID-Card
AY Mustafa, LM Jawad
Sumer University Journal for Pure Science (ISSN: 2790-7031) 2022 1 (1), 56-66, 2022
62022
PASS POINT SELECTION OF AUTOMATIC GRAPHICAL PASSWORD AUTHENTICATION TECHNIQUE BASED ON HISTOGRAM METHOD
SF Abbas, LM Jawad
Iraqi Journal of Information and Communications Technology(IJICT) 6 (1), 28-39, 2023
42023
A NEW TECHNIQUE FOR DETERMINING REGION OF INTEREST IN SELECTIVE VIDEO PROTECTION APPROACH
LM Jawad, RM Alhasany
Iraqi Journal of Information and Communications Technology 4 (2), 33-49, 2021
42021
A novel region of interest for selective color image encryption technique based on new combination between GLCM texture features
LM Jawad
2021 National Computing Colleges Conference (NCCC), 1-6, 2021
32021
An enhanced rc4 algorithm using an efficient PRNG generation method based on newton raphson method, SHA-1 and piecewise chaos method
TM Jawad, LM Jawad, DW Ahmed
J Xi'an Univ Architec Technol, 2020
32020
A Review of Selective H.264 Video Encryption Techniques
R Mohammed, LM Jawad
AIP Conference Proceedings 2398, 050006 (2022); https://doi.org/10.1063/5 …, 2022
22022
Compressed and uncompressed video steganography
MM Mashkour, LM Jawad
2022 International Conference on Electrical, Computer and Energy …, 2022
22022
Exploring Visual Cryptography Techniques: A Comprehensive Review
DNH Hajir Alauldeen Al-Bayati, Lahieb M. Jawad
Al-Nahrain Journal of Science 27 (3), 97-108, 2024
12024
A Secure Data Hiding For H. 264 Video Based on Chaotic Map Methods and RC4 Algorithm
MM Mashkour, LM Jawad, G Sulong
Iraqi Journal of Information and Communication Technology 6 (3), 50-64, 2023
12023
Enhanced Visual Cryptography Based on Arnold's Cat Map
HA Al-Bayati, DN Hamod, LM Jawad
International Journal of Computing and Related Technologies 5 (1), 1-16, 2025
2025
Hybrid Graphical Password Authentication Technique Based On GLCM And Canny Edge Detection
SF Abbas, LM Jawad
2024 1st International Conference on Emerging Technologies for Dependable …, 2024
2024
STATE-OF-THE-ART FOR EMAIL PHISHING DETECTION TECHNIQUES BASED ON DEEP LEARNING
LMJ Narmin M. Dahham
MESM'2023 The International Middle Eastern Simulation and Modelling …, 2024
2024
Text hiding in AVI Video
LM Al-Yassiry, HA Abdullah
Journal of Engineering and Development 13 (4), 122-132, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20