Image encryption based on a combination of multiple chaotic maps

MT Elkandoz, W Alexan - Multimedia Tools and Applications, 2022 - Springer
Recent years have seen a rapid evolution of digital communications and an immense use of
image transmissions over unsecured links. More specifically, some domains require the …

A detailed review based on secure data transmission using cryptography and steganography

F Varghese, P Sasikala - Wireless Personal Communications, 2023 - Springer
During the last few decades, digital communication has played a vital role in various sectors
such as healthcare departments, banking, information technology companies, industries …

Image encryption through lucas sequence, s-box and chaos theory

W Alexan, M ElBeltagy… - 2021 8th NAFOSTED …, 2021 - ieeexplore.ieee.org
The need for image encryption schemes that are of low computation complexity is ever
increasing. Meanwhile, the use of chaotic functions and mathematical sequences to …

Aes-secured bit-cycling steganography in sliced 3d images

S Yasser, A Hesham, M Hassan… - … on Innovative Trends in …, 2020 - ieeexplore.ieee.org
This paper proposes 2 double-layer message security schemes in 3D cover images. For
each of the schemes, the first layer involves the use of cryptography, namely the advanced …

Peer-to-peer user identity verification time optimization in iot blockchain network

AR Kairaldeen, NF Abdullah, A Abu-Samah, R Nordin - Sensors, 2023 - mdpi.com
Blockchain introduces challenges related to the reliability of user identity and identity
management systems; this includes detecting unfalsified identities linked to IoT applications …

Visual data security incorporating fibonacci sequence, s-box, and chaos theory

HH Hussein, W Alexan, M ElBeltagy… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Continuous innovations in the field of multimedia and its processing, combined with
unprecedented transmission speeds over wireless channels and the Internet have resulted …

Message security through aes and lsb embedding in edge detected pixels of 3d images

Y Moussa, W Alexan - 2020 2nd Novel Intelligent and Leading …, 2020 - ieeexplore.ieee.org
This paper proposes an advanced scheme of message security in 3D cover images using
multiple layers of security. Cryptography using AES-256 is implemented in the first layer. In …

Utilization of corner filters, aes and lsb steganography for secure message transmission

W Alexan, A Elkhateeb, E Mamdouh… - 2021 International …, 2021 - ieeexplore.ieee.org
This paper proposes a couple of multiple-layer message security schemes. The utilization of
cryptography as well as steganography allows the attainment of an acceptable standard of …

A combination of decimal-and bit-level secure multimedia transmission

M Gabr, HH Hussein, W Alexan - 2022 Workshop on Microwave …, 2022 - ieeexplore.ieee.org
The proliferation of multimedia production and exchange over the Internet has created a dire
need for security measures to protect it. In this paper, we propose a hybrid method for the …

[PDF][PDF] A robust high capacity gray code-based double layer security scheme for secure data embedding in 3d objects

G Mostafa, W Alexan - … Journal of Computing and Digital Systems, 2020 - researchgate.net
In this study, we propose a novel high capacity double layer algorithm for secure data
embedding in 3D ob‑jects. This is achieved by aggregating a cryptography layer through the …