Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
M.H., Mohammed Hitham
,
Hatem Elkadi H.K.
, and
Sherine Ghoneim S.G.
.
"
A 7-Layered E-Government Framework Consolidating Technical, Social and Managerial Aspects
."
International Journal of Advanced Computer Science and Applications (IJACSA)
8, no. 8 (2017).
Saeed, Hassan
.
Development of E-Government Application in Iraq: A Case Study of Iraq Ministry of Education Employment Agency
In
Graduate School Of Natural and Applied Science, Computer Engineering
. Vol. Master Thesis. Çankaya University, 2013.
Abraham, Jobin
, and
Varghese Paul
.
"
Watermark Captioning for Images in E-Governance
."
International Journal of Computer Applications in Engineering Sciences
II, no. II (2012).
Al-Muhtadi, Jalal
,
Basit Shahzad
,
Kashif Saleem
,
Wasif Jameel
, and
Mehmet A. Orgun
.
"
Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment
."
Health Informatics Journal
10, no. 22 (2017).
K. Naik, Seena
,
G. A. Ramachandra
, and
M. V. Bramhan Reddy
.
"
An Extended Security Framework for E-Government
."
International Journal of Advanced Research in Computer Science
5, no. 1 (2014): 152-154.
Meshu, Tesfayee
, and
Sanjiv G Rao
.
"
Framework for Securing Educational E-Government Service
."
International Journal on Cybernetics & Informatics (IJCI)
5, no. 4 (2016).
Røberg, Pernille Monstad
.
Unveiling barriers and enablers of risk management in interoperability efforts: A study from the Norwegian public sector
In
Faculty of Economic and Social Sciences, Department of Information Systems
. Vol. Master’s Thesis. University of Agder, 2013.
Hashim, Hasan Adnan
.
A Study of Adoption and Acceptance of e-Umrah System in Saudi Arabia: Overcoming Infrastructure Barriers and Limitations
In
Information School
. Vol. Doctor of Philosophy. University of Sheffield, 2014.
Asare-Nuamah, Peter
, and
‘Darko Emmanuel Agyepong
.
"
Techno Legal Support for E-Governance and Implementation Challenges in Ghana
."
SOCRATES: An International, Multi-lingual, Multi-disciplinary, Refereed (peer-reviewed), Indexed Scholarly journal
4, no. Extra 3 (2016): 47-57.
Izzati, Berlian Maulidya
.
Analisis Pengaruh Kualitas Layanan Publik E-Government (Government to Citizen) Terhadap Penciptaan Public Value (Studi Kasus: Kota Surabaya)
In
Institut Teknologi Sepuluh Nopember
. Vol. Masters thesis., 2017.
Guo, Jing-Ming
, and
Ming-Feng Wu
.
"
Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach
."
IEEE Transactions on Image Processing
8, no. 1 (2009).
Guo, Jing-Ming
, and
Yun-Fu Liu
.
"
Joint Compression/Watermarking Scheme Using Majority-Parity Guidance and Halftoning-Based Block Truncation Coding
."
IEEE Transactions on Image Processing
19, no. 8 (2010).
Guo, Jing-Ming
,
Min-Feng Wu
, and
Yong-Chuen Kang
.
"
Watermarking in conjugate ordered dither block truncation coding images
." In
IEEE International Symposium on Circuits and Systems
. Taipei, Taiwan , 2009.
Hu, Yu-Chen
,
Chun-Chi Lo
,
Wu-Lin Chen
, and
Chia-Hsien Wen
.
"
Joint image coding and image authentication based on absolute moment block truncation coding
."
Journal of Electronic Imaging
22, no. 1 (2013).
A.Saleh, Noura
,
Hoda N.Boghdady
,
Samir I.Shaheen
, and
Ahmed M.Darwish
.
"
High capacity lossless data embedding technique for palette images based on histogram analysis
."
Digital Signal Processing
20, no. 6 (2010): 1629-1636.
Hsu, Ching-Sheng
, and
Shu-Fen Tu
.
Digital Watermarking Scheme with Visual Cryptography
In
International MultiConference of Engineers and Computer Scientists, IMECS 2008
. Vol. I. Hong Kong, 2008.
Kim, Cheonshik
,
Dongkyoo Shin
, and
Dongil Shin
.
Data Hiding in a Halftone Image Using Hamming Code (15, 11)
In
Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science
. Vol. 6592. Berlin, Heidelberg: Springer, 2011.
Guo, Jing-Ming
, and
Jia-Jin Tsai
.
"
Reversible data hiding in low complexity and high quality compression scheme
."
Digital Signal Processing
22, no. 5 (2012): 776-785.
Kim, Cheonshik
.
Data Hiding Based on Compressed Dithering Images
In
Advances in Intelligent Information and Database Systems. Studies in Computational Intelligence
. Vol. 283. Berlin, Heidelberg: Springer, 2010.
Guo, Jing-Ming
, and
Jia-Jin Tsai
.
"
Reversible data hiding in highly efficient compression scheme
." In
IEEE International Conference on Acoustics, Speech and Signal Processing
. Taipei, Taiwan , 2009.
Tu, Shu-Fen
, and
Ching-Sheng Hsu
.
"
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
."
The International Arab Journal of Information Technology
9, no. 3 (2012).
Somasundaram, K
, and
Ph Sumitra
.
"
RGB & Gray Scale Component on MPQ-BTC in Image Compression
."
International Journal on Computer Science and Engineering (IJCSE)
3, no. 4 (2011).
Saleh, Noura A.
,
Hoda N. Boghdady
,
Samir I. Shaheen
, and
Ahmed M. Darwish
.
"
An Efficient Lossless Data Hiding Technique for Palette-Based Images with Capacity Optimization
." In
14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services
. Maribor, Slovenia , 2007.
Guo, Jing-Ming
, and
Chih-Yu Lin
.
"
Parallel and element-reduced error-diffused block truncation coding
."
IEEE Transactions on Communications
58, no. 6 (2010).
Kim, Cheonshik
,
Dongkyoo Shin
,
Dongil Shin
, and
Ching-Nung Yang
.
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC
In
Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science
. Vol. 7197. Berlin, Heidelberg: Springer, 2012.
Pages
« първа
‹ предишна
…
341
342
343
344
345
346
347
348
349
…
следваща ›
последна »
471037 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all