Copyright Protection Service for Mobile Images
Copyright Protection Service for Mobile Images

Israa Abdul- Ameer Abdul-Jabbar; Suhad Malallah Kadhim

Volume 34, 4B , April 2016, , Page 444-450

https://doi.org/10.30684/etj.34.4B.1

Abstract
  This paper presents a watermarking protocol that is used for protecting any digital image and working as a copyright registration for any important image to any user who feels his/her ...  Read More ...
Hybrid Techniques for Proposed Intelligent Digital Image Watermarking
Hybrid Techniques for Proposed Intelligent Digital Image Watermarking

Bashar S Mahdi; Alia K. Abdul Hassan

Volume 33, 4B , April 2015, , Page 702-713

https://doi.org/10.30684/etj.33.4B.13

Abstract
  Digital watermarking provides a solution of the recent problems such as a copyright protection and digital content authentication, as well as the balancing between the copyright protection ...  Read More ...
Proposed Digital Signature Using One Time Pad
Proposed Digital Signature Using One Time Pad

Shaimaa H. Shaker

Volume 31, 2 B , February 2013, , Page 261-275

https://doi.org/10.30684/etj.31.2B.13

Abstract
  Authentication protects two parties from the third party, but not protect against each other. Digital signature verification of the message source, protects the authority from anyone. ...  Read More ...
A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function
A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function

Muna Mohammed Al-Nayar

Volume 29, Issue 16 , December 2011, , Page 3291-3301

https://doi.org/10.30684/etj.29.16.3

Abstract
  Internet has opened new channel of communication enabling an e-mail to be sent to a relative thousands of kilometers away. This medium of communication opens doors for virtually free ...  Read More ...
Watermarking for Relational Database by using Threshold Generator
Watermarking for Relational Database by using Threshold Generator

Bashar Saadoon Mahdi; Yossra H. Ali

Volume 29, Issue 1 , January 2011, , Page 33-43

https://doi.org/10.30684/etj.29.1.3

Abstract
  Providing ownership on relational database is a crucial issue in today internet-based application environments and in many content distribution applications.This paper provides the ...  Read More ...
Generate Random Image-Key using Hash Technique
Generate Random Image-Key using Hash Technique

Nidaa F. Hassan; Akbas E. Ali; Teaba Wala Aldeen

Volume 28, Issue 2 , January 2010, , Page 382-398

https://doi.org/10.30684/etj.28.2.15

Abstract
  Random image is very useful to be used as a source for clipping randomnesssession keys in cryptography. In this paper a new algorithm is proposed to generaterandom image .The random ...  Read More ...