Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial
Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial

Hala B. Abdul Wahab; Abdul-Mohssen J. Abdul-Hossen; Sana Ahmed Kadhom

Volume 34, 6B , June 2016, , Page 894-900

https://doi.org/10.30684/etj.34.6B.18

Abstract
  Due to the expanding utilization of advanced media, the assurance of protected innovation rights issue has turned into an essential issue. Digital watermarking is currently drawing ...  Read More ...
Using Chebyshev Polynomial and Quadratic Bezier Curve for Secure Information Exchange
Using Chebyshev Polynomial and Quadratic Bezier Curve for Secure Information Exchange

Hala Bahjet Abdul Wahab; Tanya AbdulSattar Jaber

Volume 34, 5B , May 2016, , Page 666-674

https://doi.org/https://doi.org/10.30684/etj.34.5B.5

Abstract
  Information exchange approaches are still an important research issue in the network security, generation and sharing the secret session key is the important factor during the group ...  Read More ...
A Moment Method for the Second Order Two-point Boundary Value Problems
A Moment Method for the Second Order Two-point Boundary Value Problems

Ahmed M. Shokr; Bushra E. Kashem; Fuad A. Alheety

Volume 28, Issue 11 , May 2010, , Page 2212-2220

https://doi.org/10.30684/etj.28.11.11

Abstract
  In this paper a Moment method based on the second, third and fourth kindChebyshev polynomials is proposed to approximate the solution of a linear twopointboundary value problem of the ...  Read More ...