[1]
A. W. Naji, A. S. Housain, B. B. Zaidan, A. A. Zaidan and A. H. Shihab, Security improvement of credit card online purchasing system, Scientific Research and Essays 6: 16 (2011), pp.3357-3370.
DOI: 10.5897/sre11.117
Google Scholar
[2]
X. Hannan, B. Christianso and Z. Ying, A purchase protocol with live cardholder authentication for online credit card payment, Proceedings of IEEE Computer Society Fourth International Conference on Information Assurance and Security, Washington, DC, USA, 2008, pp.15-20.
DOI: 10.1109/ias.2008.44
Google Scholar
[3]
I. Adebayo, E-commerce – Nigerian Goldmine? www. ifeadebayo. com.
Google Scholar
[4]
H. O. Alanazi, H. A. Jalab, G. M. Alam, B. B. Zaidan and A. A. Zaidan, Securing electronic medical records transmissions over unsecured communications: an overview for better medical governance, Journal of Medical Plants Research, 4: 19 (2010).
DOI: 10.5897/jmpr10.325
Google Scholar
[5]
S. Saini, How do sensitive screens work? www. engineering. mit. edu/live/news/1439, (2011).
Google Scholar
[6]
D. Kumar, R. Yeonseung and K. Dongseop, A survey on biometric fingerprints: the cardless payment system, Proceedings of International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, 2008, pp.1-6.
DOI: 10.1109/isbast.2008.4547633
Google Scholar
[7]
S. Sumanjeet, Emergence of payment systems in the age of electronic commerce: the state of art, Global Journal of Business Research, 2: 2 (2009), pp.17-36.
Google Scholar
[8]
J. Trevathan, A. McCabe and W. Read, Online payments using handwritten Signature verification, Proceedings of IEEE Computer Society Sixth International Conference on Information Technology: New Generations, Las Vegas, Nevada, USA, 2009, pp.901-907.
DOI: 10.1109/itng.2009.105
Google Scholar
[9]
K. Woong-Sik, K. Byung-Ik and C. Yun-Seung, A credit card verification system by biometric method, Proceedings of the 9th International Conference on the Control, Automation, Robotics and Vision, Singapore, 2006, p.1 – 4.
DOI: 10.1109/icarcv.2006.345119
Google Scholar
[10]
A. A. Zaidan, B. B. Zaidan, A. K. Al-Frajat and H. A. Jalab, An overview: theoretical and mathematical perspectives for advance encryption standard/rijndael, Journal of Applied Science, 10: 18 (2010), pp.2161-2167.
DOI: 10.3923/jas.2010.2161.2167
Google Scholar
[11]
H. Ihmaidi, A. Al-Jaber and A. Hudaib, Securing online shopping using biometric personal authentication and steganography, 2nd IEEE International conference on Information and Communication Technologies: From Theory to Applications, 2006, Damascus, Syria, pp.233-238.
DOI: 10.1109/ictta.2006.1684376
Google Scholar
[12]
A. A. Zaidan, B. B. Zaidan, H. O. Alanazi, A. Gani, O. Zakaria and G. M. Alam, Novel approach for high (secure and rate) data hidden within triplex space for executable file, Science Research Essays, 5: 15 (2010), p.1965–(1977).
Google Scholar
[13]
A. A. Zaidan, B. B. Zaidan, A. Y. Taqa, K. M. S. Mustafa, G. M. Alam and H. A. Jalab, Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem, International Journal of the Physical Sciences, 5: 21 (2010).
Google Scholar
[14]
A. K. Hmood, H. A. Jalab, Z. M. Kasirun, A. A. Zaidan and B. B. Zaidan, On the capacity and security of steganography approaches: an overview. Journal of Applied Science, 10: 16 (2010), pp.1825-1833.
DOI: 10.3923/jas.2010.1825.1833
Google Scholar
[15]
A. K. Hmood, H. A. Jalab, Z. M. Kasirun, A. A. Zaidan and B. B. Zaidan, On the accuracy of hiding information metrics: counterfeit protection for education and important certificates, International Journal of the Physical Sciences. 5: 7 (2010).
Google Scholar
[16]
A. K. Hmood, B. B. Zaidan, A. A. Zaidan and H. A. Jalab, An overview on hiding information technique in images, Journal of Applied Science, 10: 18 (2010), pp.2094-2100.
DOI: 10.3923/jas.2010.2094.2100
Google Scholar
[17]
B. B. Zaidan, A. A. Zaidan, A. K. Al-Frajat and H. A. Jalab, On the differences between hiding information and cryptography techniques: an Overview, Journal of Applied Science, 10: 15 (2010), pp.1650-1655.
DOI: 10.3923/jas.2010.1650.1655
Google Scholar
[18]
B. B. Zaidan, A. A. Zaidan, A. Taqa, G. M. Alam, M. L. M. Kiah and H. A. Jalab, StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem, International Journal of the Physical Sciences 5: 11 (2010).
Google Scholar
[19]
Shihab AH, Zaidan BB, Zaidan AA, Naji AW, Omar F. Accurate Method to Measure Three Dimensional Skull Bio-Metric, J. Appl. Sci., 10: 2 (2010), pp.145-150.
DOI: 10.3923/jas.2010.145.150
Google Scholar