Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption LM Jawad, G Sulong Nonlinear Dynamics 81 (4), 2079-2093, 2015 | 32 | 2015 |
A review of color image encryption techniques LM Jawad, GB Sulong International Journal of Computer Science Issues (IJCSI) 10 (6), 266, 2013 | 25 | 2013 |
A new scan pattern method for color image encryption based on 3D-Lorenzo chaotic map method LM Jawad Multimedia Tools and Applications, 2021 | 12 | 2021 |
AN EFFECTIVE COLOR IMAGE ENCRYPTION SCHEME BASED ON DOUBLE PIECEWISE LINEAR CHAOTIC MAP METHOD AND RC4 ALGORITHM LM JAWAD, TM JAWAD, DW AHMED Journal of Engineering Science and Technology 16 (2), 1319 - 1341, 2021 | 10 | 2021 |
A novel dynamic secret key generation for an efficient image encryption algorithm LM Jawad, G Sulong Modern Applied Science 9 (13), 85, 2015 | 10 | 2015 |
A survey on emerging challenges in selective color image encryption techniques LM Jawad, G Sulong Indian Journal of Science and Technology 8 (27), 1-12, 2015 | 10 | 2015 |
Secure Image Encryption Scheme Using Chaotic Maps and RC4 Algorithm LM Jawad, R Mohammed Solid State Technology 63 (3), 3465-3449, 2020 | 7 | 2020 |
Electronic Student Attendance Management System Based on ID-Card AY Mustafa, LM Jawad Sumer University Journal for Pure Science (ISSN: 2790-7031) 2022 1 (1), 56-66, 2022 | 6 | 2022 |
PASS POINT SELECTION OF AUTOMATIC GRAPHICAL PASSWORD AUTHENTICATION TECHNIQUE BASED ON HISTOGRAM METHOD SF Abbas, LM Jawad Iraqi Journal of Information and Communications Technology(IJICT) 6 (1), 28-39, 2023 | 4 | 2023 |
A NEW TECHNIQUE FOR DETERMINING REGION OF INTEREST IN SELECTIVE VIDEO PROTECTION APPROACH LM Jawad, RM Alhasany Iraqi Journal of Information and Communications Technology 4 (2), 33-49, 2021 | 4 | 2021 |
A novel region of interest for selective color image encryption technique based on new combination between GLCM texture features LM Jawad 2021 National Computing Colleges Conference (NCCC), 1-6, 2021 | 3 | 2021 |
An enhanced rc4 algorithm using an efficient PRNG generation method based on newton raphson method, SHA-1 and piecewise chaos method TM Jawad, LM Jawad, DW Ahmed J Xi'an Univ Architec Technol, 2020 | 3 | 2020 |
A Review of Selective H.264 Video Encryption Techniques R Mohammed, LM Jawad AIP Conference Proceedings 2398, 050006 (2022); https://doi.org/10.1063/5 …, 2022 | 2 | 2022 |
Compressed and uncompressed video steganography MM Mashkour, LM Jawad 2022 International Conference on Electrical, Computer and Energy …, 2022 | 2 | 2022 |
Exploring Visual Cryptography Techniques: A Comprehensive Review DNH Hajir Alauldeen Al-Bayati, Lahieb M. Jawad Al-Nahrain Journal of Science 27 (3), 97-108, 2024 | 1 | 2024 |
A Secure Data Hiding For H. 264 Video Based on Chaotic Map Methods and RC4 Algorithm MM Mashkour, LM Jawad, G Sulong Iraqi Journal of Information and Communication Technology 6 (3), 50-64, 2023 | 1 | 2023 |
Enhanced Visual Cryptography Based on Arnold's Cat Map HA Al-Bayati, DN Hamod, LM Jawad International Journal of Computing and Related Technologies 5 (1), 1-16, 2025 | | 2025 |
Hybrid Graphical Password Authentication Technique Based On GLCM And Canny Edge Detection SF Abbas, LM Jawad 2024 1st International Conference on Emerging Technologies for Dependable …, 2024 | | 2024 |
STATE-OF-THE-ART FOR EMAIL PHISHING DETECTION TECHNIQUES BASED ON DEEP LEARNING LMJ Narmin M. Dahham MESM'2023 The International Middle Eastern Simulation and Modelling …, 2024 | | 2024 |
Text hiding in AVI Video LM Al-Yassiry, HA Abdullah Journal of Engineering and Development 13 (4), 122-132, 2009 | | 2009 |