The International Arab Journal of Information Technology (IAJIT)

Unconstraint Assignment Problem: A Molecular Computing Approach Ibrahim Zuwairie1&2, Tsuboi Yusei2, Ono Osamu2, and Khalid Marzuki3

Abstract:Deoxyribonucleic Acid or DNA-based computing is an emerging field that bridging the gap between chemistry,

Person-Independent Facial Expression Recognition Based on Compound Local Binary Pattern (CLBP)

            2Samsung Bangladesh R & D Center Ltd, Bangladesh                                                                                3Department of Computer Science and Engineering, Ahs anullah University of Science and Technology, 

VLSI-Oriented Lossy Image Compression Approach using DA-Based 2D-Discrete

Devangkumar Shah1 and Chandresh Vithlani2 1Electronics and Communication Department, RK Univer sity, India 2Electronics and Communication Department, Governmen t Engineering College, India

Image Steganography Based on Hamming Code

School of Electronics and Information Engineering, Fuqing Branch of Fujian Normal University, China

Progressive Visual Cryptography with Friendly and Size Invariant Shares

like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human

Fast and Robust Copy-Move Forgery Detection Using Wavelet Transforms and SURF

Mohammad Hashmi1 and Avinash Keskar2 1Department of Electronics and Communication Engineering, National Institute of Technology Warangal,

A Steganography Scheme on JPEG Compressed Cover Image with High Embedding Capacity

Arup Kumar Pal1, Kshiramani Naik1, and Rohit Agarwal2 1Department of Computer Science and Engineering, Indian Institute of Technology(ISM), India 2Department of Computer Science and Engineering, JSS Academy of Technical Education, India