YA Alsultanny - Image and Vision Computing, 2008 - Elsevier
The random number generated is very important in constructing encryption keys together with the other algorithm parameters. A new approach is proposed to generate a random-bit …
In data encryption, the security of the algorithm is measured based on Shannon's confusion and diffusion properties. This paper identifies the correspondences and highlights the …
MS Arafath, KUR Khan… - … Conference on Recent …, 2018 - ieeexplore.ieee.org
Due to the vigorous constraint of resources in Opportunistic Sensor Network (OSN) and IoT having sensors and their applications in military and business raises demand to look out …
, Q JHQHUDO VHFXULW\LV FRQFHSWXDOO\³IUHHGRP I computer science perspective, it is the deterrence of, or safeguard against, unauthorized access to data as well as …
Y Alsultanny - Journal of Discrete Mathematical Sciences and …, 2007 - Taylor & Francis
A new algorithm is developed for image encryption by using the CBC (Code Block Chaining) mode. The algorithm depends on the secrete key that is generated from the image …
Steganalysis is the technique of analyzing a stego-image to determine whether it has embedded data or not. More deliberately steganalysis, it can be achieved by coding a …