Journal of Engineering and Applied Sciences
Year:
2019
Volume:
14
Issue:
4
Page No.
1331 - 1338
References
AL-Nasrawi, D.A., A.F. Almukhtar and W.S. AL-Baldawi, 2015. From Arabic alphabets to two dimension shapes in Kufic calligraphy style using grid board catalog. Commun. Appl. Sci., 3: 42-59.
AL-Nasrawi, D.A., H.A. Hashem and M.A. Odhaib, 2014. Unicode text editor for ancient Egyptian hieroglyphs writing system. Egypt. Comput. Sci. J., 38: 48-55.
Direct Link | AL-Shakarchy, N.D., H.F. AL-Shahad and D.A. AL-Nasrawi, 2018. Cryptographic system based on Unicode. IOP. Conf. Series J. Phys., 1032: 1-13.
CrossRef | Direct Link | Al-Nasrawi, D.A., H.F. Sedik and S.M. Hussain, 2016. Digital handwriting imitation of the Fourth Caliph (Imam Ali Bin Abi Taleb). Comput. Intl. J. Digital Content Technol. Appl., 10: 96-105.
Direct Link | Alqahtani, Y., P.P. Kuppuswamy and S. Shah, 2013. New approach of Arabic encryption/decryption technique using Vigenere chiper on mod 39. Intl. J. Adv. Res. IT. Eng., 2: 1-9.
Anonymous, 2018. Report on the current status of United Nations Romanization systems for geographical. UNGEGN Working Group on Romanization Systems, Rome. https://www.eki.ee/wgrs/rom1_ar.pdf
Atee, H.A.Z., 2011. Development of a new way to encrypt the Arabic language letters using the symmetric encryption system. AL TAQANI, 24: 101-111.
Direct Link | Balajee, M., 2011. Unicode and colors integration tool for encryption and decryption. Intl. J. Comput. Sci. Eng., 3: 1197-1202.
Direct Link | Ganzfried, S. and P. Cull, 2004. A simple algorithm for knight’s tours. Math. Oregon State Univ., 1: 63-90.
Direct Link | Hassan, M.M., D.A. Al-Nasrawi, R.J. Hassan and N.T. Mahdi, 2018. Rule based method of name entity recognition for matching Allah’s finest names in Holy Quran. J. Eng. Appl. Sci., 13: 3618-3623.
Direct Link | Kumar, R., S. Chand and S. Singh, 2015. An efficient text steganography scheme using unicode space characters. Intl. J. Forensic Comput. Sci., 10: 8-14.
CrossRef | Direct Link | Kuppuswamy, P. and Y. Alqahtani, 2014. New innovation of Arabic language encryption technique using new symmetric key algorithm. Intl. J. Adv. Eng. Technol., 7: 30-37.
Direct Link | Mansour, A.M.A. and M.A.M. Fouad, 2017. Cryptography protocol: A novel multilingual adaptive encryption technique with phonetic based ciphering. Intl. J. Secur. Appl., 11: 13-21.
Rahma, A.M.S., W.S. Bhaya and D.A. Al-Nasrawi, 2013. Data hiding method for English scripts using ligature characters Unicode. Eur. J. Sci. Res., 112: 452-459.
Direct Link | Rahma, A.M.S., W.S. Bhaya and D.A. Al-Nasrawi, 2013. Text steganography based on unicode of characters in multilingual. Intl. J. Eng. Res. Appl., 3: 1153-1165.
Raphael, A.J. and D.V. Sundaram, 2012. Secured communication through Fibonacci numbers and Unicode symbols. Intl. J. Sci. Eng. Res., 3: 1-5.
Direct Link | Rihan, S.D. and S.E.F. Osma, 2016. Arabic cryptography technique using neural network and genetic algorithm. Intl. Res. J. Comput. Sci., 3: 35-42.
CrossRef | Direct Link | Shaban, S.A. and N.B. Al-Din, 2017. A new algorithm for encrypting Arabic text using the mathematical equation. Diyala J. Eng. Sci., 10: 21-30.
Direct Link | Stallings, W., 2005. Cryptography and Network Security: Principles and Practices. 4th Edn., Prentice Hall, New Jersey, ISBN-13: 978-0131873162.
Van Tilborg, H.C.A., 1992. Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers, Boston, Dordrecht, London, ISBN-13:978-0792386759, Pages: 492.