Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Hamdy M. Kelash"'
Autor:
Hamdy M. Kelash, Ashraf A. M. Khalaf, Hesham F. A. Hamed, Osama F. AbdelWahab, Aziza I. Hussein
Publikováno v:
Procedia Computer Science. 182:5-12
One must compress data prior to sending it to the internet since it helps minimize time and the cost. The main aim of the essay is to develop and design a systemic and a secure method for encrypting data, so as it can be used in executing a lossless
Publikováno v:
Multimedia Tools and Applications. 80:9877-9893
New hybrid cryptosystems represent a highly effective method for increasing security levels of Voice over Internet Protocol (VoIP) systems. In this paper, a dual-security cryptosystem for VoIP voicemail is proposed based on two-factor authentication,
Publikováno v:
Procedia Computer Science. 163:49-53
Modern information systems’ security is heavily reliant on data encryption techniques. Chaos and image encryption techniques have garnered a great deal of attention with several recently developed models. In this study, we propose a novel hybrid en
Autor:
Osama S. Faragallah, Hamdy M. Kelash, Mohamed A. Elaskily, Abdullah F. Alenezi, Hala S. El-sayed
Publikováno v:
Multimedia Tools and Applications.
Nowadays, data hiding techniques are one of the most growing researching areas. This paper introduces a quadruple histogram shifting-based reversible data embedding approach for digital images. Pixel differences distribution is utilized for maximizin
Publikováno v:
Applied Soft Computing. 61:427-446
Cardiovascular diseases (CVDs) are considered the first cause of mortality and the major health concern according to recent statistics worldwide. Most CVDs are preventable by early prediction and detection to avoid the risk factors. Accurate early de
Autor:
Osama F. Abdel Wahab, Hamdy M. Kelash, Hesham F. A. Hamed, Hanafy M. Ali, Ashraf A. M. Khalaf, Aziza I. Hussein
Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::263a0317eadd320f66a99b40c97ff516
https://zenodo.org/record/3961099
https://zenodo.org/record/3961099
Autor:
Hamdy M. Kelash, Sabry S. Nassar, Mohsen A. M. El-Bendary, Fathi E. Abd El-Samie, Osama S. Faragallah, Nabil M. Ayad, Hala S. El-sayed
Publikováno v:
Wireless Personal Communications. 91:1023-1049
The popularity of wireless multimedia applications in real life and the open nature of wireless media for access make the security of confidential multimedia over wireless channels a major task. This paper proposes a two multi-layer security algorith
Publikováno v:
International Journal of Computing and Digital Systems. 5:325-336
Publikováno v:
Computer Science & Information Technology (CS & IT).
Autor:
Hala S. El-sayed, Osama S. Faragallah, Mohsen A. M. El-Bendary, Nabil M. Ayad, Fathi E. Abd El-Samie, Sabry S. Nassar, Hamdy M. Kelash
Publikováno v:
Wireless Personal Communications. 88:479-491
In this paper, a content-based image verification scheme is presented. This scheme is suitable for verifying the integrity of images transmitted over insecure networks. The Discrete Cosine Transform is used to embed a block-based mark for each block