Keywords = steganography
Number of Articles: 99

1

A Coding-Based Steganography Using Multiple Frequency Domains

Journal of university of Anbar for Pure science
Volume 3, Issue 1, Spring 2009, Page 152-160
Omed Salim Khalind; Raoof Smko Assef; Ahmed Tariq Sadiq

2

Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography

Iraqi Journal of Science
Volume 59, Issue 1, Winter 2018, Page 600-606
Eman Salim Ibrahim Harba

3

A Hybrid Approach to Steganography System Based on Quantum Encryption and Chaos Algorithm

Journal of University of Babylon
Volume 26, Issue 2, Spring 2018, Page 280-294
Zaid A. Abod

4

A Method for Randomly Hiding Secret Encrypted Data in Images using Cellular Automata

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 13, Issue 1, Spring 2019, Page 28-36
Ansam O. Abdulmajeed; Fatima M. Abdullatif; Wafaa A. Mustafa

5

A method to hide text in image

Journal of Misan Researches
Volume 12, Issue 24, Autumn 2016, Page 11-23
Ahmed Kadem Hamed Al-Saedi

6

An Efficient Steganography Model Using Video Compression and Image Steganography

Journal of University of Babylon
Volume 24, Issue 5, Spring 2016, Page 1154-1145
Baheja KudhairShukur; Saba Mohammed Hussain; Ali Kadhim AL-Bermani

7

A New Algorithm for a Steganography System

Engineering and Technology Journal
Volume 33, Issue 8, Autumn 2015, Page 1955-1970
Atheer Alaa Sabri; Marwa Jaleel Mohsin

8

A New Algorithm for Less Distortion and High Capacity Steganography Model Using Blocks-Based Method

Engineering and Technology Journal
Volume 28, Issue 13, Spring 2010, Page 2592-2607
Wathiq L. Abd Ali; Salah Mahdi Saleh

9

A New Hiding Method based on DCT and Arnold Transform

Iraqi Journal of Information Technology
Volume 6, Issue 3, Summer 2014, Page 30-40
Dhiaa Hussein Alzubidi; Dina Riyadh Abd alrazaq

10

An FPGA Implementation of Secured Steganography Communication System

Tikrit Journal of Engineering Sciences
Volume 21, Issue 1, Autumn 2014, Page 1-9
Ahlam Fadhil Mahmood; Sana Sami Mohmmad; Nada Abdul Kanai

11

An FPGA Implementation of Secured Steganography Communication System

Tikrit Journal of Engineering Sciences
Volume 19, Issue 4, Autumn 2012, Page 14-23
Sana Sami Mohmmad; Dr. Ahlam Fadhil Mahmood; Nada Abdul Kanai

12

An Investigation for Steganalysis in Color Images

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 8, Issue 2, Autumn 2011, Page 151-167
Samah F. Aziz; Ahmed S. Nori

13

An Investigation for Steganography using Different Color System

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 7, Issue 3, Autumn 2010, Page 91-108
Amira B. Sallow; Zahraa M. Taha; Ahmed S. Nori

14

A Novel Technique for Hiding Text and Image in Color Image

JOURNAL OF THI-QAR SCIENCE
Volume 3, Issue 3, Summer 2013, Page 158-165
Aeada K. Al-Bedri

15

A proposal of Multimedia Steganography Algorithm based on Improved Least Significant Bit (LSB) Method

Iraqi Journal of Science
Volume 58, Issue 4, Autumn 2018, Page 2188-2199
Huda Dheyauldeen Najeeb; Israa Tahseen Ali

16

A Proposal of Steganography Algorithm by Random Image Transformation

Al-Rafidain University College For Sciences
Volume 0, Issue 35, Summer 2017, Page 246-265
Maisa; a Abid Ali Kodher

17

A Proposed Method for Encrypting Data In Image by Using Cryptography Technique and Steganography

AL-MANSOUR JOURNAL
Volume 0, Issue 22, Summer 2017, Page 95-109
Hasan M. Azzawi

18

Arabic stego_system based on Arabic Language structure and pronunciation

AL-MANSOUR JOURNAL
Volume 0, Issue 20, Summer 2017, Page 161-169
Ismael Abdulsattar; Naji M.Sahib

19

A Technique for Image Steganography Based on Optimal Resilient Boolean Functions and DCT

IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING
Volume 13, Issue 2, Summer 2013, Page 71-80
Azhar Malik

20

Blind Steganalysis using One-Class Classification

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 13, Issue 2, Autumn 2019, Page 28-41
Mohammed A. Karem M.; Ahmed Sami Nori

21

Color Images Hiding Based on Wavelet Based Fusion

Engineering and Technology Journal
Volume 29, Issue 15, Autumn 2011, Page 3158-3171
Saddam Kamil Alwane

22

Comparison between Hiding in Corners Regions and Hiding in Regions between Corners by using Characteristic Regions of FAST Corner Detection

Journal of College of Education
Volume 1, Issue 3, Autumn 2017, Page 225-238
Abdulameer A. Karim; EkhlasFalih Nasser

23

Corners-based Image Information Hiding Method

Iraqi Journal for Computers and Informatics ijci
Volume 43, Issue 1, Spring 2017, Page 1-5
Ahmed Talib

24

Design a Hybrid Cryptosystem Based Chaos and Sharing for Digital Audio

IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING
Volume 17, Issue 1, Autumn 2017, Page 59-70
Mahmood Z. Abdullah; Zinah J. Khaleefah

25

Design and Implementation of Secure Public Key Steganography

Engineering and Technology Journal
Volume 28, Issue 3, Winter 2010, Page 431-444
Ghadah Salim Mouhamad; Alia Karim Abdul Hassan

26

Design and implementing securely hiding system using Neighborhoods of the pixels

Journal of Univesity of Thi-Qar
Volume 10, Issue 3, Summer 2015, Page 1-14
Wijdan R Abdulhussien

27

Development of Signature in Signature Hiding Model

Baghdad College of Economic sciences University
Volume 0, Issue 19, Winter 2018, Page 351-366

28

Distributed AMELSB Replacement Method For Text Hiding

Iraqi Journal of Information Technology
Volume 8, Issue 2, Spring 2018, Page 1-12
Yossra H. Ali; Ahmed Y. Yousif; Tayseer S. Atia

29

DNA Sequences as a Medium for Steganography Method of Codon Frequency with Character Frequency

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 9, Issue 2, Autumn 2012, Page 99-112
Sadoon H. Abdullah; Ahmed S. Nori

30

Dynamic least significant bit technique for video steganography

journal of kerbala university
Volume 11, Issue 0, Winter 2015, Page 243-252
Wafaa hasan alwan

31

Dynamics and Chaotic of Polynomials on Quasi Banach Spaces

Iraqi Journal of Science
Volume 56, Issue 2, Spring 2015, Page 1111-1123
Naseif Jasim Al-Jawari; Arwa Nazar Mustafa; Radhi I. M. Ali; Jalal H. Hussein AL-Bayati; Inaam Mohammed Ali; Tha; ar Younis Ghawi; Enas M. Kamil; Bahar H. AL- Bahraany; Bara; a Ali Attea; Sarab M. Hameed; Rasha A. Mohammed; A. Attea; Baraa; Mays M. Hoobi; Salah. A. Salman; Maha. A. Rajab; Uday. E. Jallod; Mohammed I. Abd-Almajied; Ali K. Resen

32

Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3

Engineering and Technology Journal
Volume 27, Issue 13, Summer 2009, Page 423-429
Mohammed Moanes Ezzaldean Ali; Hanan A. R. Akkar; A. K. M. AL-Shaikhli; Ali K. Shayyish; Muhsin J. Jweeg; Wisam Auday Hussain; Mohammed T. Hussein; Mohammad A. Al-Neami; Farah S. Al-Jabary; Jafar M. Hassan; Ali H. Tarrad; Mohammed N. Abdullah; Ahmed T. Mahdi; Eyad K. Sayhood; Husain M. Husain; Nidaa F. Hassan; Rehab F. Hassan; Akbas E. Ali; Assim H Yousif; Kassim K Abbas; Aqeel M Jary; Shakir A. Salih; Ali T. Jasim; Ammar A. Ali; Hosham Salim; JafarM. Daif; Ali H. Al Aboodi; Ammar S. Dawood; Sarmad A. Abbas; Salah Mahdi Saleh; Roshen T. Ahmed; Aseel B. Al-Zubaidi; Mohammed Y. Hassan; Majid A. Oleiwi; Shaimaa Mahmood Mahdy; Husain M. Husain; Mohammed J. Hamood; Shaima; a Tariq Sakin

33

Efficient Text Message Hidden Technique Using YIQ Model

JURNAL OF MADENAT ALELEM COLLEGE
Volume 9, Issue 1, Spring 2017, Page 217-228
Entidhar Mhawes Zghair; Ali Nasser Hussain

34

Embedding Algorithm using multiple pseudo random number generators with LSB technique

Baghdad College of Economic sciences University
Volume 0, Issue 55, Autumn 2018, Page 407-416
Aysar Sh. Alsaadi; Sewadi; Hamza A. A. Al

35

Embedding Data In Personal Image By Using Mosaic Image

JOURNAL OF EDUCATION AND SCIENCE
Volume 28, Issue 4, Autumn 2019, Page 258-269
Kanar M. Sami

36

Encrypting Audio Data Hiding by Visual Secret Sharing

Engineering and Technology Journal
Volume 27, Issue 13, Summer 2009, Page 2352-2364
Nidaa F. Hassan; Rehab F. Hassan; Akbas E. Ali

37

Enhance the Hiding Image by Using Compression and Securing Techniques

Iraqi Journal for Computers and Informatics ijci
Volume 43, Issue 1, Spring 2017, Page 14-16
Saif Saad; Fouad H. Awad; Ahmed S. Farhan

38

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher

Engineering and Technology Journal
Volume 27, Issue 13, Summer 2009, Page 2457-2473
Salah Mahdi Saleh

39

Fuzzy Based Clustering for Grayscale Image Steganalysis

Iraqi Journal of Science
Volume 56, Issue 2, Spring 2015, Page 1161-1175
Sarab M. Hameed; Rasha A. Mohammed; A. Attea; Baraa

40

Hidden Messages in JPEG Image Using Steganography

JOURNAL OF EDUCATION AND SCIENCE
Volume 25, Issue 1, Winter 2012, Page 136-149
Mafaz Mohsin Khalil; Sadoon Hussin Abdullha

41

Hide Compressed Texts in an Audio File

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 10, Issue 1, Winter 2013, Page 263-274
Shahad Abdel-Rahman Hasso

42

Hide Encoded Text Within the Image by Using the Third Least Significant Bit

Journal of Univesity of Thi-Qar
Volume 9, Issue 4, Autumn 2014, Page 1-11
Zainb Bakar Dahoos

43

Hide text in audio channels within files

JOURNAL OF EDUCATION AND SCIENCE
Volume 27, Issue 3, Spring 2018, Page 99-117
Hassan AL-Numa

44

Hiding Data in a Colored Image using the Similarity and Knapsack Algorithm

Baghdad College of Economic sciences University
Volume 0, Issue 42, Summer 2018, Page 431-442
Sana Ahmed Kadhom Sana Ahmed Kadhom

45

Hiding Data Using LSB-3

Journal of Basrah Researches (Sciences)
Volume 33, Issue 4, Autumn 2007, Page 81-88
Aiad Ibraheem Abdul-Sada

46

HidingFingerprint byUsing PIFS and DCT

Journal of College of Education for Pure Science
Volume 4, Issue 2, Autumn 2014, Page 163-171
Firas S. Miften; Kadhim H. Kuban; Wessam A.Hamed

47

Hiding Information in an Image Based on Bats Algorithm

Iraqi Journal of Information Technology
Volume 8, Issue 2, Spring 2018, Page 128-141
Ismael Salih Albayaty; Ahmed Luay Ahmed; Noor Hasan Hassoon; Hazim Noman Abed

48

Hiding Information Using Circular Distribuition

Journal of College of Education
Volume 0, Issue 1, Autumn 2017, Page 101-114
Rajaa Ahmed Ali; Muntadher Khamees Mustafa; Ali A. Alani

49

Hiding Information using Replacement in Silent Mutation of DNA Sequences

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 10, Issue 2, Spring 2013, Page 113-134
Sadoon H. Abdullah; Ahmed S. Nori

50

Hiding in Text using Information Integrity Service

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 6, Issue 1, Spring 2009, Page 115-122
Dujan B. Taha; Ahmed S. Nori; Yaseen H. Ismaiel

51

Hiding Secret Audio Message Inside Smaller Size Audio Cover

Diyala Journal For Pure Science
Volume 6, Issue 1, Winter 2010, Page 16-28
and Abd Al-Basset; Assis. Prof. Ziyad Tariq Mustafa Al-Ta

52

Hiding Techniques using Mp3

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 7, Issue 3, Autumn 2010, Page 209-226
Shyma Sh. Mohammed; Ahmed S. Nori

53

Hiding the Text in Image of Variable Size

Diyala Journal For Pure Science
Volume 11, Issue 2, Spring 2015, Page 44-55
Abdullah .H. Muhammad

54

Hiding Three Images at one image by Using Wavelet Coefficients at Color Image

basrah journal of science
Volume 28, Issue 1, Summer 2010, Page 58-73
Emad S. Al-Shawi and Hussain L. Hussain; Haidar M. Abdul-Nabi

55

High Capacity Audio Steganography Based on Contourlet Transform

Tikrit Journal of Engineering Sciences
Volume 25, Issue 1, Winter 2018, Page 1-7
Abbas Salman Hameed

56

Image steganography by using SVD and chaotic Zig Zag map

Iraqi Journal of Information Technology
Volume 7, Issue 2, Spring 2017, Page 45-56
Manar Muafak Rashied

57

Image Stego Detection using Higher Order Statistics

ALNAHRAIN JOURNAL FOR ENGINEERING SCIENCES
Volume 13, Issue 2, Autumn 2010, Page 141-149
Prof. Mahir K. AL-a; zawi; Assistant Lecturer Ammar Moufak J. Yousif

58

Improving Hiding Information Process based on GA Technique with Secure Extraction Process

IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING
Volume 10, Issue 1, Autumn 2010, Page 98-106
Susan .S. Ghazoul; Lina Saeed Jajo

59

Increase Security of Image Encryption Depends on Change Pixel Location

journal of the college of basic education
Volume 23, Issue 98, Summer 2017, Page 57-64
Prof. Dr.Ziad M. Abood; Zainab M.Essa

60

Information Hiding in Image Based on Random Locations

IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING
Volume 12, Issue 2, Autumn 2012, Page 9-15
Mohsin H. AL-Zohairi

61

Information hiding in Linked Opened Data

Journal of University of Babylon
Volume 24, Issue 3, Spring 2016, Page 556-564
Asaad Sabah Hadi

62

LBS Steganography Method an Mobile Image Based on NTRU Algorithm

Journal of College of Education
Volume 0, Issue 1, Autumn 2017, Page 149-170
Zainab khyioon Abdalrdha; Mushtaq Talib Ajjah; Huda Abdul-alteef Abdul-ijabbar

63

Matlab Coding For Text Steganography SystemBy Using LSB Insertion Method With Key

basrah journal of science
Volume 33, Issue 2, Autumn 2015, Page 37-51
Lemya G. Shehab and Zeynab M. Jawar; Mohammed J. Khami

64

Modifying Randomized Transform Image Steganography Using IDWT

AL-yarmouk Journall
Volume 0, Issue 1, Autumn 2015, Page 131-148
Maisa; Bushra Abdul-Kareem Abdul-Azeez; Ass.Lec; lec; a Abid Ali Kodher

65

MPEG Video Steganography (High order I-frame Bite Seeding Method)

Baghdad College of Economic sciences University
Volume 0, Issue 10, Winter 2018, Page 347-365
Murtadha Kamil Kadhim; Lamiaa Hafiz Khalid

66

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION

DIYALA JOURNAL OF ENGINEERING SCIENCES
Volume 8, Issue 4, Autumn 2015, Page 479-492
Ali J. Abboud

67

Multi-Layers of Data Security System: Encrypted Image in Image Steganography

Iraqi Journal of Information Technology
Volume 7, Issue 1, Winter 2017, Page 15-30
Mustafa Dhiaa Al-Hassani

68

Multistage Hiding Image Techniques

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 7, Issue 2, Summer 2010, Page 151-166
Nadia M. Mohammed

69

Neural Network Using for Extracting Hidden Information in Images

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 10, Issue 3, Summer 2013, Page 113-130
safwan hasoon; Farhad M. Khalifa

70

New Algorithm for Text in Text Steganography

Al-Rafidain University College For Sciences
Volume 0, Issue 23, Winter 2017, Page 99-112
Nidhal K. El Abbadi

71

New Stenographic method to hiding information in digital image

Journal of university of Anbar for Pure science
Volume 9, Issue 2, Summer 2015, Page 80-84
Falath M.Mohammed

72

Novel security Image Steganography Based on DWT and Pseudorandom Sequences

Journal of Engineering and Sustainable Development
Volume 14, Issue 1, Winter 2010, Page 134-148
Awatf A. Jafar; Refat Talib Hussein

73

Principle of Steganography Tool BCS (Bilevel Compression by Using Steganography)

Engineering and Technology Journal
Volume 24, Issue 8, Summer 2005, Page 955-960
Yaser Ali; Muzhir Sh. Al-Ani

74

Proposal Algorithm for Image Steganography by Hue Wavelet Transform Using Histogram

Journal of College of Education
Volume 0, Issue 3, Autumn 2017, Page 275-288
Maisa; a Abid Ali Kodher; Muntaha K. Abbas

75

Proposed Hiding Text in Text Based On RNA for Encoding Secret Information

Iraqi Journal of Science
Volume 58, Issue 1, Winter 2018, Page 562-573
Suhad M. Kadhem; Dhurgham W. Mohammed Ali

76

PROPOSED METHOD OF INFORMATION HIDING IN IMAGE

Journal of Kufa for Mathematics and Computer
Volume 2, Issue 1, Spring 2015, Page 22-27
Hayder I. Hendi; Shaker K. Ali

77

Review Study among Traditional LSB, Proposed Modified LSB and DWT Steganography Algorithm

AL-MANSOUR JOURNAL
Volume 0, Issue 27, Autumn 2017, Page 37-56
Soukaena H. Hashem; Eman Taleb Zghaer

78

Robust and Secured Image Steganography using LSB and Encryption with QR Code

Journal of Al-Qadisiyah for Computer Science and Mathematics
Volume 9, Issue 2, Autumn 2017, Page 1-9
Hazim Noman Abed

79

SECRET MESSAGE ENCODED BY EBCDIC IN MULTIPLE DCT FOR TWO COVERS

Al-Qadisiyah Journal for Engineering Sciences
Volume 5, Issue 3, Summer 2012, Page 224-234
Ahmed Hassan Hadi

80

Secure Watermark Image Steganography by Pixel Indicator Based on Randomization

JURNAL OF MADENAT ALELEM COLLEGE
Volume 4, Issue 2, Autumn 2012, Page 101-110
M. Hamid Mohammed Farhan; Zena Ahmed

81

SELECTED LEAST SIGNIFICANT BIT APPROACH FOR HIDING INFORMATION INSIDE COLOR IMAGE STEGANOGRAPHY BY USING MAGIC SQUARE

Journal of Engineering and Sustainable Development
Volume 21, Issue 1, Winter 2017, Page 74-88
Sahar Mahdie Klim

82

Signature Steganography

Tikrit Journal of Pure Science
Volume 17, Issue 4, Autumn 2012, Page 261-265
Thahir Abd-Alhadi; Ziyad Tariq Mustafa

83

STATISTICAL MODELS PRODUCED FROM FISHER INFORMATION FUNCTION

Baghdad College of Economic sciences University
Volume 0, Issue 42, Summer 2018, Page 377-388
Azzam A.Tawfiq; Aloosy; Prof. Dr. Ahmed Al; Dr. Shakir Naji Mahmood; Assistant Lecturer Ali yahya Gheni; Dr. Bensaid Mohamed; Leila Zekraoui; Naji M. Sahib; Sana Ahmed Kadhom Sana Ahmed Kadhom

84

Steganalysis Using KL Transform and Radial Basis Neural Network

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 9, Issue 1, Spring 2012, Page 47-58
Safwan Hasoon; Farhad M. Khalifa

85

Steganographic Algorithm in Spatial Domain

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 4, Issue 1, Spring 2007, Page 160-176
Dujan B. Taha; Ghada Mohammad Tahir Qasim

86

Steganographic scheme to avoid statistical Steganalysis

JOURNAL OF THE COLLEGE OF EDUCATION FOR WOMEN
Volume 25, Issue 1, Winter 2014, Page 249-256
Jamal A. Othman

87

Steganography based on Vector Quantization Technique

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 10, Issue 3, Summer 2013, Page 13-27
Ansam Osamah; Ahmed S. Nori

88

Steganography (Encoding text and Hiding it within image)

kirkuk university journal for scientific studies
Volume 3, Issue 2, Autumn 2008, Page 70-87
Asim M. Murshid

89

Steganography System to Hide a Sound File in a Color Image

JOURNAL OF THI-QAR SCIENCE
Volume 3, Issue 3, Summer 2013, Page 182-191
Hameed Abdul-Kareem Younis; Aliaa; Jaber Jalil; Zainab Ali Abbood

90

Steganography System Using Wavelet Transform ( Image Inside Image)

Al-Rafidain University College For Sciences
Volume 0, Issue 28, Spring 2017, Page 46-65
Fatma Hassan Al-Rubbiay

91

Steganography using Energy-LSB Embedded Method

AL-MANSOUR JOURNAL
Volume 0, Issue 23, Summer 2017, Page 87-100
Zainab M. Hussain

92

Steganography Using TCP / IP's Sequence Number

Journal of Al-Nahrain University - Science
Volume 20, Issue 4, Autumn 2017, Page 102-108
Jamal M. Kadhim; Abeer E. Abed

93

Text Hiding in AVI Video

Journal of Engineering and Sustainable Development
Volume 13, Issue 4, Autumn 2009, Page 112-122
Hamsa A. Abdullah; Lahieb M. Al-Yassiry

94

Text Hiding in AVI Video

Journal of Engineering and Sustainable Development
Volume 14, Issue 1, Winter 2010, Page 103-113
Hamsa A. Abdullah; Lahieb M. Al-Yassiry

95

Text Hiding Using Artificial Neural Networks

Engineering and Technology Journal
Volume 30, Issue 20, Autumn 2012, Page 3553-3564
Haider Tarish Haider; Faiq Sabar Baji; Ahmad Saeed Mohammad

96

Text Steganography Method Based On Modified Run Length Encoding

Iraqi Journal of Science
Volume 57, Issue 3, Spring 2016, Page 2338-2347
Suhad Malallah Kadhem

97

Using a Parser for Steganography Purpose

Engineering and Technology Journal
Volume 33, Issue 4, Spring 2015, Page 654-667
Suhad M. Kadhem; Abdulraheem A. Abdulraheem

98

Using B+ Tree To Represent Secret Messages For Steganography Purpose

Engineering and Technology Journal
Volume 28, Issue 15, Summer 2010, Page 5102-5112
Suhad M. Kadhem

99

Watermarking in WAV Files Bases on Phase Coding

Engineering and Technology Journal
Volume 29, Issue 4, Winter 2011, Page 770-780
Salah S. Alrawi; Rasheed Abdulshaheed; Akeel A. Alhadithy