Skip to content
VuFind
  • Feedback
  • Book Bag: 0 items (Full)
  • Login
    • العربية
    • الإنجليزية

Discover Knowledge Resources!

Explore our comprehensive collection of books, articles, digital media, and more

Advanced
  • OneSearch
  • Library Catalog
  • Digital Repository
  • Channels
  • Information hiding technique in digital image using transform domain \
Search for more channels:

Similar Items: Information hiding technique in digital image using transform domain \

Developing a robust digital image watermark by using frequency and spatial domains \

Digital image processing /

Digital image processing /

Digital image processing /

Digital image processing /

Image encryption based on chaos technique \

Arabic Image Caption Generator Using Deep Learning Techniques /

Digital image processing algorithms and applications /

Digital image processing and analysis : human and computer vision applications with CVIPtools /

Improving the watermarking performance using combined redundant discrete wavelet transform and contourlet transform scheme \

Image Processing Applications Using Matlab /

Digital imaging : a practical handbook /

Image processing : the fundamentals /

Selection of the appropriate cover to hide information in images \

Improving cross-domain using Current Certificate Status Protocol (CCSP) /

Color image segmentation based on region growing algorithm \

Digital imaging and communications in medicine (DICOM): a practical introduction and survival guide /

Digital signal processing /

Digital signal processing /

Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /

Topic: Computer security

Principles of information security /

Integrating security and software engineering : advances and future visions /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Information security : principles and practice /

Encyclopedia of information ethics and security /

Information hiding technique in digital image using transform domain \

Foundations of computer science : from data manipulation to theory of computation /

Network security : private communication in a public world /

Bi-directional transition mechanism between IPv4 and IPv6 \

The art of software security assessment : identifying and preventing software vulnerabilities /

Risk Assessment in Cyber-Physical System /

Foundations of computer security /

Information security fundamentals /

A method for improving the Bluetooth key exchange security /

A hybrid fingerprint identification & verification algorithm \

Computer security : principles and practice /

Information security : a strategic approach /

Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /

Information security : principles and practices /

Security in computing /

Topic: Cryptography

  • Topic: Data protection
  • Topic: Image processing
  • Topic: Digital techniques

Understanding cryptography : a textbook for students and practitioners /

Information hiding technique in digital image using transform domain \

Cryptography : theory and practice /

Ibn ad-Durayhim's treatise on cryptanalysis.

A classical introduction to cryptography : applications for communications security /

Coding theory and cryptography : the essentials /

Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /

Series on Arabic origins of cryptology /

Advances in coding theory and crytography/

Elliptic curves : number theory and cryptography /

Introduction to modern cryptography /

Introduction to modern cryptography /

Theory of cryptography : 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007 : proceedings /

Cryptography : theory and practice /

Author: Al-Ahwal, Ibtesam Salah S.

Information hiding technique in digital image using transform domain \

Author: Ajlouni, Naim M.

Information hiding technique in digital image using transform domain \

Discover Knowledge with Imam University's Digital Discovery Portal

Access thousands of academic resources, research materials, and scholarly publications

Start Exploring Now
Imam University Team
Imam University Logo

Imam Muhammad Ibn Saud Islamic University

Riyadh, Kingdom of Saudi Arabia
+966 11 259 5000
info@imamu.edu.sa

Resources

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
  • Educational resources
  • ImamU API

Search & Help

  • Basic search
  • Advanced search
  • Search history
  • Feedback
  • Search Tips
  • Ask a Librarian
  • Help
  • FAQs
  • Service level agreement
  • End User Agreement

Connect With Us

© 2026 Imam Muhammad Ibn Saud Islamic University. All rights reserved.

VuFind