Baydaa Hashim

Baydaa Hashim
University of Technology

MS

About

4
Publications
418
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4
Citations
Citations since 2017
2 Research Items
3 Citations
20172018201920202021202220230.00.51.01.52.02.53.0
20172018201920202021202220230.00.51.01.52.02.53.0
20172018201920202021202220230.00.51.01.52.02.53.0
20172018201920202021202220230.00.51.01.52.02.53.0

Publications

Publications (4)
Article
Full-text available
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by...
Conference Paper
Full-text available
Zigbee is a technology operates under IEEE 802.15.4 standard. It has been developed to define a specific set of communication protocols that support short-range, low cost and low power consumption wireless networking that are designed for control and monitoring applications. These applications are merely require security, reliability, in addition t...
Conference Paper
Hiding information by embedding secret data into an innocuous medium is often referred to as steganography. Steganography can be applied electronically by taking a message (a binary file) and some sort of cover (often a sound or image file) and combining both to obtain a “stego-object”. The stego-object is essentially the cover with its redundant i...

Network

Cited By