Skip to main content

Showing 1–15 of 15 results for author: Zaidan, B B

.
  1. arXiv:2302.08496  [pdf

    cs.DC cs.CR

    A review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations

    Authors: Norah M. Alshahrani, M. L. Mat Kiah, B. B. Zaidan, A. H. Alamoodi, Abdu Saif

    Abstract: A smart contract is a digital program of transaction protocol (rules of contract) based on the consensus architecture of blockchain. Smart contracts with Blockchain are modern technologies that have gained enormous attention in scientific and practical applications. A smart contract is the central aspect of a blockchain that facilitates blockchain as a platform outside the cryptocurrency spectrum.… ▽ More

    Submitted 12 January, 2023; originally announced February 2023.

    Comments: Review

  2. arXiv:2201.03391  [pdf

    cs.CR

    Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard

    Authors: Mohamed Abomhara, Omar Zakaria, Othman O. Khalifa, A. A Zaidan, B. B Zaidan

    Abstract: Multimedia information availability has increased dramatically with the advent of mobile devices. but with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified with more specific as encryption information, an… ▽ More

    Submitted 10 January, 2022; originally announced January 2022.

  3. arXiv:1006.4565  [pdf

    cs.SE

    An Overview: Extensible Markup Language Technology

    Authors: Rami Alnaqeib, Fahad H. Alshammari, M. A. Zaidan, A. A. Zaidan, B. B. Zaidan, Zubaidah M. Hazza

    Abstract: XML stands for the Extensible Markup Language. It is a markup language for documents, Nowadays XML is a tool to develop and likely to become a much more common tool for sharing data and store. XML can communicate structured information to other users. In other words, if a group of users agree to implement the same kinds of tags to describe a certain kind of information, XML applications can assist… ▽ More

    Submitted 23 June, 2010; originally announced June 2010.

    Comments: IEEE Publication Format, https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617

  4. arXiv:1006.4559  [pdf

    cs.OH

    Analytical Study on Internet Banking System

    Authors: Fadhel. S. AlAbdullah, Fahad H. Alshammari, Rami Alnaqeib, Hamid A. Jalab, A. A. Zaidan, B. B. Zaidan

    Abstract: The Internet era is a period in the information age in which communication and commerce via the Internet became a central focus for businesses, consumers, government, and the media. The Internet era also marks the convergence of the computer and communications industries and their associated services and products. Nowadays, the availability of the Internet make it widely used for everyday life. In… ▽ More

    Submitted 23 June, 2010; originally announced June 2010.

    Comments: IEEE Publication Format, https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617

  5. arXiv:1006.4547  [pdf

    cs.DL

    New Quantitative Study for Dissertations Repository System

    Authors: Fahad H. Alshammari, Rami Alnaqeib, M. A. Zaidan, Ali K. Hmood, B. B. Zaidan, A. A. Zaidan

    Abstract: In the age of technology, the information communication technology becomes very important especially in education field. Students must be allowed to learn anytime, anywhere and at their own place. The facility of library in the university should be developed. In this paper we are going to present new Quantitative Study for Dissertations Repository System and also recommend future application of th… ▽ More

    Submitted 23 June, 2010; originally announced June 2010.

    Comments: IEEE Publication Format, https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617

  6. arXiv:1006.2809  [pdf

    cs.CL

    Offline Arabic Handwriting Recognition Using Artificial Neural Network

    Authors: A. A Zaidan, B. B Zaidan, Hamid. A. Jalab, Hamdan. O. Alanazi, Rami Alnaqeib

    Abstract: The ambition of a character recognition system is to transform a text document typed on paper into a digital format that can be manipulated by word processor software Unlike other languages, Arabic has unique features, while other language doesn't have, from this language these are seven or eight language such as ordo, jewie and Persian writing, Arabic has twenty eight letters, each of which can b… ▽ More

    Submitted 14 June, 2010; originally announced June 2010.

    Comments: Submitted to Journal of Computer Science and Engineering, see http://sites.google.com/site/jcseuk/volume-1-issue-1-may-2010

    Journal ref: Journal of Computer Science and Engineering, Volume 1, Issue 1, p55-58, May 2010

  7. arXiv:1003.4086  [pdf

    cs.CR cs.MM

    Overview: Main Fundamentals for Steganography

    Authors: Zaidoon Kh. AL-Ani, A. A. Zaidan, B. B. Zaidan, Hamdan. O. Alanazi

    Abstract: The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate protection because of the signi… ▽ More

    Submitted 22 March, 2010; originally announced March 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/

  8. arXiv:1003.4085  [pdf

    cs.CR

    New Comparative Study Between DES, 3DES and AES within Nine Factors

    Authors: Hamdan. O. Alanazi, B. B. Zaidan, A. A. Zaidan, Hamid A. Jalab, M. Shabbir, Y. Al-Nabhani

    Abstract: With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, also the internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It… ▽ More

    Submitted 22 March, 2010; originally announced March 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/

  9. arXiv:1003.4084  [pdf

    cs.MM cs.CR

    New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files

    Authors: Hamdan. O. Alanazi, A. A. Zaidan, B. B. Zaidan, Hamid A. Jalab, Zaidoon Kh. AL-Ani

    Abstract: With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important, Another problem with digital document a… ▽ More

    Submitted 22 March, 2010; originally announced March 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 3, March 2010

  10. arXiv:1002.4049  [pdf

    cs.MM cs.CR

    Optimization Digital Image Watermarking Technique for Patent Protection

    Authors: Mahmoud Elnajjar, A. A Zaidan, B. B Zaidan, Mohamed Elhadi M. Sharif, Hamdan. O. Alanazi

    Abstract: The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue. Another problem with digital document and video is that undetectable m… ▽ More

    Submitted 21 February, 2010; originally announced February 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/

  11. arXiv:1002.4047  [pdf

    cs.CR

    Intrusion Detection System: Overview

    Authors: Hamdan. O. Alanazi, Rafidah Md Noor, B. B Zaidan, A. A Zaidan

    Abstract: Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lear… ▽ More

    Submitted 21 February, 2010; originally announced February 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/

  12. arXiv:1002.2416  [pdf

    cs.CR cs.MM

    New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques

    Authors: Rafiqul Islam, A. W. Naji, A. A. Zaidan, B. B. Zaidan

    Abstract: A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillan… ▽ More

    Submitted 11 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 273-279, January 2010, USA

  13. arXiv:1001.3502  [pdf

    cs.CV

    3D Skull Recognition Using 3D Matching Technique

    Authors: Hamdan. O. Alanazi, B. B Zaidan, A. A Zaidan

    Abstract: Biometrics has become a "hot" area. Governments are funding research programs focused on biometrics. In this paper the problem of person recognition and verification based on a different biometric application has been addressed. The system is based on the 3DSkull recognition using 3D matching technique, in fact this paper present several bio-metric approaches in order of assign the weak point in… ▽ More

    Submitted 20 January, 2010; originally announced January 2010.

    Journal ref: Journal of Computing, Vol. 2, Issue 1, January 2010

  14. arXiv:0912.3986  [pdf

    cs.CR

    Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation

    Authors: Hamid. A. Jalab, A. A Zaidan, B. B Zaidan

    Abstract: Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image's bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In this framework we will propose a collaborate approach for sel… ▽ More

    Submitted 20 December, 2009; originally announced December 2009.

    Journal ref: Journal of Computing, Volume 1, Issue 1, pp 108-113, December 2009

  15. arXiv:0908.0216  [pdf

    cs.CR

    Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

    Authors: A. W. Naji, Shihab A. Hameed, B. B. Zaidan, Wajdi F. Al-Khateeb, Othman O. Khalifa, A. A. Zaidan, Teddy S. Gunawan

    Abstract: The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the infor… ▽ More

    Submitted 3 August, 2009; originally announced August 2009.

    Comments: 6 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA