Follow
Ramadhan J. Mstafa
Ramadhan J. Mstafa
Department of Computer Science, University of Zakho, Kurdistan Region, Iraq
Verified email at uoz.edu.krd - Homepage
Title
Cited by
Cited by
Year
A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC
RJ Mstafa, KM Elleithy, E Abdelfattah
IEEE access 5, 5354-5365, 2017
1032017
A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes
RJ Mstafa, KM Elleithy
Multimedia Tools and Applications 75 (17), 10311-10333, 2016
942016
A highly secure video steganography using Hamming code (7, 4)
RJ Mstafa, KM Elleithy
2014 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2014
892014
A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)
RJ Mstafa, KM Elleithy
IEEE Wireless Telecommunications Symposium (WTS), 2015, 1-8, 2015
572015
Compressed and raw video steganography techniques: a comprehensive survey and analysis
RJ Mstafa, KM Elleithy
Multimedia Tools and Applications 76 (20), 21749-21786, 2017
542017
A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes
RJ Mstafa, KM Elleithy
2015 Long Island Systems, Applications and Technology, 1-7, 2015
402015
Video steganography techniques: taxonomy, challenges, and future directions
RJ Mstafa, KM Elleithy, E Abdelfattah
2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2017
372017
A DCT-based robust video steganographic method using BCH error correcting codes
RJ Mstafa, KM Elleithy
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2016
352016
A new video steganography algorithm based on the multiple object tracking and Hamming codes
RJ Mstafa, KM Elleithy
2015 IEEE 14th International Conference on Machine Learning and Applications …, 2015
352015
A novel video steganography algorithm in DCT domain based on hamming and BCH codes
RJ Mstafa, KM Elleithy
2016 IEEE 37th Sarnoff symposium, 208-213, 2016
292016
Em-sep: an efficient modified stable election protocol
AA Malluh, KM Elleithy, Z Qawaqneh, RJ Mstafa, A Alanazi
Proceedings of the 2014 Zone 1 Conference of the American Society for …, 2014
292014
Information hiding in images using steganography techniques
RJ Mstafa
ASEE, 2013
232013
An efficient video steganography algorithm based on BCH codes
RJ Mstafa, KM Elleithy
Asee, 2015
222015
A new video steganography scheme based on Shi-Tomasi corner detector
RJ Mstafa, YM Younis, HI Hussein, M Atto
IEEE Access 8, 161825-161837, 2020
192020
An ECC/DCT-based robust video steganography algorithm for secure data communication
RJ Mstafa, KM Elleithy
Journal of Cyber Security and Mobility 5 (3), 167–194, 2017
122017
Analysis of Routing Protocols over VANET
RJ Mstafa
ASEE, 2013
102013
Face Recognition Based on Gabor Feature Extraction Followed by FastICA and LDA
MM Hassan, HI Hussein, AS Eesa, RJ Mstafa
CMC-Computers, Materials & Continua 68 (2), 1637-1659, 2021
92021
Improving AODV routing protocol for image transmission over mobile video sensor networks
M Atto, RJ Mstafa, A Alkhayyat
IEEE Access 8, 169396-169407, 2020
82020
Video steganography techniques: Taxonomy, challenges, and future directions. 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 1–6
RJ Mstafa, KM Elleithy, E Abdelfattah
IEEE. https://doi. org/10.1109/lisat, 2017
62017
A Comprehensive Survey on Bone Segmentation Techniques in Knee Osteoarthritis Research: From Conventional Methods to Deep Learning
SM Ahmed, RJ Mstafa
Diagnostics 12 (3), 611, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20