Securing images using high dimensional chaotic maps and DNA encoding techniques

M Es-Sabry, N El Akkad, M Merras, K Satori… - IEEE …, 2023 - ieeexplore.ieee.org
With the growing need for secure multimedia data transmission, image encryption has
become an important research area. Traditional encryption algorithms like RSA are not well …

[HTML][HTML] An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers

M Es-sabry, N El Akkad, L Khrissi, K Satori… - Egyptian Informatics …, 2024 - Elsevier
In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging
the potential of four 1D chaotic maps–the Logistic map, Tent map, Chebyshev map, and …

Efficient Braille Transformation for Secure Password Hashing

H Touil, N El Akkad, K Satori, NF Soliman… - IEEE …, 2024 - ieeexplore.ieee.org
In this work, we propose a novel approach to enhancing the security of passwords before
storing them in databases. Our method utilizes Braille transformation to encrypt the …

Securing the storage of passwords based on the MD5 HASH transformation

H Touil, N El Akkad, K Satori - International Conference on Digital …, 2021 - Springer
The hash function is designed to fold an input array of any size into a bit string. For the MD5,
this is a very convenient algorithm for comparison and storage. For example, Unix systems …

An RGB image encryption algorithm based on Clifford attractors with a bilinear transformation

FE Azzaby, NE Akkad, K Sabour, S Kabbaj - … On Big Data and Internet of …, 2021 - Springer
This work represents a new contribution in the field of encryption of RGB images, using
Clifford attractors, which are the basic constituents of chaos theory, considering the dynamic …

Homomorphic method additive using pailler and multiplicative based on RSA in integers numbers

H Touil, N El Akkad, K Satori - International Conference On Big Data and …, 2021 - Springer
When we use conventional encryption, we are confronted with a situation we are used to
and don't even consider it a problem. To work with encrypted data, we have to decipher it …

A lightweight identity-based secondary authentication method in smart grid

Y Yu, J Yao, W Wang, L Qiu, Y Xu - 2022 IEEE 10th joint …, 2022 - ieeexplore.ieee.org
5G network slicing plays a key role in the smart grid business. The existing authentication
schemes for 5G slicing in smart grids require high computing costs, so they are time …

Data-Driven Precision Agriculture Advanced Irrigation System for Sustainable Smart Farming

A Ghilan, EL Youssef, M MERRAS… - 2024 4th International …, 2024 - ieeexplore.ieee.org
Precision Agriculture (PA) is a farming management strategy that leverages digital
technologies and techniques to monitor and optimize agricultural production processes. By …

Ensure the confidentiality of documents shared within the enterprise in the cloud by using a cryptographic delivery method

H Touil, N El Akkad, K Satori - International Conference on Digital …, 2022 - Springer
Cloud-based software services have recently gained popularity due to their architecture,
which provides numerous benefits to their users. These services, for ex-ample, enable …

Strengthening security in cryptographic protocols in the era of quantum computers

H TOUIL, N EL AKKAD… - International Journal of …, 2024 - journals.uob.edu.bh
This research addresses the escalating security concerns associated with the rapid
evolution of quantum computers. With quantum advancements posing potential threats to …