College of Science

Share Audio Cryptography Using DCT Transform

An Effective and secure protection of sensitive information is the primary concern in communication systems or network storage systems, it is important for any information process to ensure data is not being tampered. To achieve confidentiality and integrity of multimedia information, various Secret Sharing Schemes (SSS) have been developed.This thesis presents a (2,n) threshold Secret Sharing Scheme, which is one of the types of SSS and a special  kind of  (k, n) threshold scheme.

English

Personal Assistant Email Agent

Email is one of the most useful communication tools over the Internet; Email can be an effective knowledge management tool which conveniently enables fast and accurate communication. On the other side, the increasing volume of email threatens to cause a state of “email overload” at which the volume of messages exceeds individuals’ capacity to process them. The recent phenomena of email-overloading in daily life and business have created new problems to users.

English

IRIS RECOGNITION BASED ON SEMANTIC INDEXING

The vast improvement of electronic commerce paved the way to the fear of terrorism since the traditional ways of personal identification like ID cards and passwords are no longer sufficient. Biometrics is the more secure option that uses parts of a body for authentication and thus is practically impossible to get lost, stolen or forgotten.Biometric identification is an emerging technology that can solve security problem in our worked society.

English