Dr.Ammar Almomani | Al-Balqa Applied University (original) (raw)
Uploads
Teaching Documents by Dr.Ammar Almomani
Book Reviews by Dr.Ammar Almomani
to check your isi& IF journal by Dr.Ammar Almomani
Papers by Dr.Ammar Almomani
IETE Technical Review, 2013
ABSTRACT The art and science of using digital images for secret communication is known as image s... more ABSTRACT The art and science of using digital images for secret communication is known as image steganography. This paper presents a background on key concepts behind it. A representation of steganography area is graphically and mathematically shown. The origin and history of this area, its important properties, and major applications are outlined. An introduction to steganalysis is provided. Distinctions between steganography, cryptography, and watermarking in terms of technique and intent are briefly discussed. Details of the way images are represented are outlined. Benefits and drawbacks of steganography domains are highlighted. Common approaches used for embedding messages into images are discussed in some detail. Methods used for embedding messages into images are also explored. Current steganography tools are highlighted. A demonstration of how secret information is embedded into an image through the use of available steganographic tools is shown. Comparisons between different image steganography algorithms are also provided.
This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of ser... more This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated using different attack rates starting from 1000 Pings to 1500 Pings, and the normal traffic packets were generated using different ping rates starting from 10 Pings to 15 Pings, for each ICMPv6 Packet, RTT was calculated. The dataset consists of 2000 recorded, which divided into two sets: 80% for training and 20% for testing, the proposed proved that we can detect ICMPv6 Flood Attack with low root mean square error which about 0.26.
IETE Technical Review, 2013
ABSTRACT The art and science of using digital images for secret communication is known as image s... more ABSTRACT The art and science of using digital images for secret communication is known as image steganography. This paper presents a background on key concepts behind it. A representation of steganography area is graphically and mathematically shown. The origin and history of this area, its important properties, and major applications are outlined. An introduction to steganalysis is provided. Distinctions between steganography, cryptography, and watermarking in terms of technique and intent are briefly discussed. Details of the way images are represented are outlined. Benefits and drawbacks of steganography domains are highlighted. Common approaches used for embedding messages into images are discussed in some detail. Methods used for embedding messages into images are also explored. Current steganography tools are highlighted. A demonstration of how secret information is embedded into an image through the use of available steganographic tools is shown. Comparisons between different image steganography algorithms are also provided.
This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of ser... more This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated using different attack rates starting from 1000 Pings to 1500 Pings, and the normal traffic packets were generated using different ping rates starting from 10 Pings to 15 Pings, for each ICMPv6 Packet, RTT was calculated. The dataset consists of 2000 recorded, which divided into two sets: 80% for training and 20% for testing, the proposed proved that we can detect ICMPv6 Flood Attack with low root mean square error which about 0.26.