The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Quran is the holy book for all Muslims around the world. Since more than 1400 years, it was preserved in all possible ways from distortion. The huge increment and spread of digital media and internet usage, leaded to many organizational and individual websites, services, and applications are being introduced to spread the knowledge related to Quran as well as Quranic Verses, Translations, Explanations...
There are many Arabic websites contain phrases from the Quran. Regrettably, the Quran texts appeared in a majority of websites were suffering from many mistakes and typos. Hence, finding the correct form of Quran verses has become almost impossible without referring to a verified printed manuscript. Therefore, it is important for many web users to verify the Quran words they read on a website. In...
The online Holy Quran is no longer scarce in the virtual world. Software developers have built many Holy Quran applications to satisfy the online users' need. This is a healthy situation as it increases access of Holy Quran concurrently bridging the gap to making Holy Quran as human companion and savior. However, despite the availability of many online applications of the Holy Quran, control over...
The phenomenon of widespread usage of smart phone has encouraged many android applications to be produced, by free or paid. Nowadays, with the trend of communicating through social networking applications and social networking sites, Muslims tend to share the image of verse from the Quran applications to the sites. Several concerns regarding security and copy control of the verse text image have aroused,...
The Holy Quran is very important to the Muslims with respect to its authenticity. This paper studies and exploits the fragile watermarking method that works on block-wise in the wavelet domain and pixel-wise in the spatial domain. The input image is transformed into wavelet domain using discrete wavelet transform. Then, using block-wise based approach the coefficients matrix of wavelet-transformed...
Nowadays, with the development of technology transfer to the information transmitted safely started to carry more importance to reach the desired aim. The science of information security is composed of steganography, watermarking, cryptography and authentication. Steganography is one of the subset of information security. In steganography objective data on the desired data to hide any cover. Thus,...
With the advancements in technology and the increase use of the Internet, information dissemination of digital text documents have seen an exponential growth with Arabic language being one of the top ten languages in the Internet. The Islamic content has also seen an increase in the last two decades. Thus, portions of Qur'anic text, i.e. verse/s, have appeared in many online articles and many of these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.