
Rola Al-khalidUniversity of Jordan | UJ · Department of Computer Information Systems
Rola Al-khalid
M.S.C.S.
About
18
Publications
8,322
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
117
Citations
Citations since 2017
Introduction
Publications
Publications (18)
Pattern matching algorithms have many applications that cover a wide range including information retrieval, text processing, DNA sequence analysis and pattern recognition. In this paper, we propose a new algorithm ERS-A, that made enhancements on both two sliding windows (TSW) and Fast Pattern Matching (RS-A) algorithms. In ERS-A and TSW algorithms...
Both cryptography and steganography are usually used to ensure information safety in today's data communication. This paper makes use of both concepts and presents a multimedia multilevel hiding technique. This technique hides more than one colored encrypted image with encrypted data in a meaningful colored cover image. The hidden secret images wit...
In this paper, we propose a string matching algorithm -Enhanced Two Sliding Windows (ETSW), which made an improvement on the Two Sliding Windows algorithm (TSW). The TSW algorithm scans the text from both sides simultaneously using two sliding windows. The ETSW algorithm enhances the TSW's process by utilizing the idea of the two sliding windows an...
In this research, we propose a fast pattern matching algorithm: The Two Sliding Windows (TSW) algorithm. The algorithm makes use of two sliding windows, each window has a size that is equal to the pattern length. Both windows slide in parallel over the text until the first occurrence of the pattern is found or until both windows reach the middle of...
A Business process architecture (BPA) is one of the significant assets in educational systems as it helps to understand and optimize educational processes by focusing on the key processes rather than the organizational specific details. The semantic, Riva-based business process architecture (srBPA) ontology is an abstract ontology that semantically...
Visual cryptography is an important technique for data hiding. In Visual cryptography (VC), a secret image is divided into multiple number of shares. Shares are distributed among multiple recipients, which makes it impossible for hackers to extract secret data from one share without having the other shares and thus data communication becomes secure...
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed. In this paper we p...
Pattern matching is a very important topic in computer science. It has been used in various applications
such as information retrieval, virus scanning, DNA sequence analysis, data mining, machine
learning, network security and pattern recognition. This paper has presented a new pattern
matching algorithm—Enhanced ERS-A, which is an improvement over...
This paper presents an efficient pattern matching algorithm (FSW). FSW improves the searching process for a pattern in a text. It scans the text with the help of four sliding windows. The windows are equal to the length of the pattern, allowing multiple alignments in the searching process. The text is divided into two parts; each part is scanned fr...
Pattern matching is a very important topic in computer science. It has been used in various applications
such as information retrieval, virus scanning, DNA sequence analysis, data mining, machine
learning, network security and pattern recognition. This paper has presented a new pattern
matching algorithm—Enhanced ERS-A, which is an improvement over...
Data hiding, a form of steganography, is one of the emerging techniques that embeds secret data into a digital media and thus ensures secured data transfer. In this paper, the steganographic method used, is based on audio steganography which is concerned with embedding secret data in an audio file. The basic idea of our proposed method is that the...
Universities all over the world have many buildings and facilities distributed inside and outside of their campus location, and they are used by students for different reasons such as academic, entertainment, services, etc. These may include faculty buildings, cafés, libraries, restaurants and others. For newly registered students and even current...
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security and to increase the payload. Both are important parameters in information hiding. The proposed techniques provide three levels of security...