A multilayered audio signal encryption approach for secure voice communication

HA Abdallah, S Meshoul - Electronics, 2022 - mdpi.com
In this paper, multilayer cryptosystems for encrypting audio communications are proposed.
These cryptosystems combine audio signals with other active concealing signals, such as …

A survey of image encryption algorithms

QH Makki, AM Abdalla… - … Conference on Information …, 2021 - ieeexplore.ieee.org
Data and image security is one of the most important aspects of information storage as well
as the massive and still expanding internet. The frequent use of images of various types …

[PDF][PDF] An audio shuffle-encryption algorithm

AA Tamimi, AM Abdalla - The world congress on engineering and …, 2014 - iaeng.org
This novel algorithm employs a shuffling procedure to perform encryption of audio files,
applying the stream cipher method. The algorithm uses a private key to perform encryption …

A new audio encryption algorithm based on chaotic block cipher

EA Albahrani - 2017 Annual Conference on New Trends in …, 2017 - ieeexplore.ieee.org
In this paper, new encryption algorithm for audio file is proposed based on a combination
between block cipher and chaotic maps. The proposed algorithm encrypts and decrypts a …

A review of nonlinear image-denoising techniques

AM Abdalla, MS Osman… - 2018 Second World …, 2018 - ieeexplore.ieee.org
This paper discusses different nonlinear techniques for removing noise from images; ie,
image denoising. These techniques differ in terms of algorithm design, purpose …

Secure robot face recognition in cloud environments

C Karri - Multimedia Tools and Applications, 2021 - Springer
In robotic applications, recognition of human faces at high speed is important to improve
human-machine interaction. Recognition speed can be limited by the on-board computation …

[HTML][HTML] A simple flexible cryptosystem for meshed 3D objects and images

MAAJA Mizher, R Sulaiman, AMA Abdalla… - Journal of King Saud …, 2021 - Elsevier
In cryptography, the previous research generally appears ambiguous and complex to the
novice researcher due to the use of complex mathematical equations and rules of …

Privacy preserving face recognition in cloud robotics: a comparative study

C Karri, O Cheikhrouhou, A Harbaoui, A Zaguia… - Applied sciences, 2021 - mdpi.com
Real-time robotic applications encounter the robot on board resources' limitations. The
speed of robot face recognition can be improved by incorporating cloud technology …

Robust encrypted face recognition robot based on bit slicing and Fourier transform for cloud environments

M Antonijevic, I Strumberger… - Journal of …, 2022 - spiedigitallibrary.org
In the field of computer vision, face recognition has become a trending research topic, and is
widely used in the area of network security. The transmission of data over a network via a …

Deep learning algorithms for secure robot face recognition in cloud environments

C Karri, MSR Naidu - 2020 IEEE Intl Conf on Parallel & …, 2020 - ieeexplore.ieee.org
To improve human-machine interaction in real-time robotic applications, especially in face
recognition task, speed is limited because of robot on board limitations. The speed can be …