Ahmed Elmhalaway
Menoufia University
SteganographyAlgorithmImage (mathematics)Confusion and diffusionCroppingPseudorandom number generatorColor imagePermutationEncryptionDigital watermarkingArtificial intelligenceWatermarkOne-dimensional spaceCryptographyPattern recognitionRange (mathematics)Logistic mapImage resolutionSensitivity (control systems)Discrete cosine transformSecurity levelChaoticSubstitution (logic)Hybrid imageMATLABHénon mapChaotic mapSecurity layerInformation hidingComputer visionComputer securityComputer scienceLeast significant bitDiscrete wavelet transformCryptosystemStationary wavelet transformStandard mapRGB color modelArithmetic
6Publications
2H-index
17Citations
Publications 6
Newest
#1Ayman M. Hemdan (Menoufia University)H-Index: 1
#2Osama S. Faragallah (Menoufia University)H-Index: 16
Last. Ahmed Elmhalaway (Menoufia University)H-Index: 2
view all 4 authors...
This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modifications in the second stage. The original Logistic map has a small range of key-space. The three modifications of Logistic map increased key-space range due to expanding the range of the original Logistic...
4 CitationsSource
#1Khalid A. Al-Afandy (Menoufia University)H-Index: 5
#2Walid El-Shafai (Menoufia University)H-Index: 8
Last. M. M. El-Halawany (Menoufia University)H-Index: 6
view all 9 authors...
Digital watermarking is an efficient and promising mechanism for protecting the copyright of the transmitted multimedia information. Thus, this paper presents two robust hybrid color image watermarking techniques. The objective of the proposed watermarking techniques is to increase the immunity of the watermarked color images against attacks and to achieve adequate perceptual quality. The first proposed hybrid technique is the homomorphic transform based Singular Value Decomposition (SVD) in Dis...
16 CitationsSource
#1Ayman M. HemdanH-Index: 1
Last. Ahmed ElmhalawayH-Index: 2
view all 4 authors...
Source
This paper presents a comparison between different audio speech encryption and decryption techniques for audio speech signals based on 2-D chaotic map algorithms with time and transform domains in a search for best of them and study advantages and disadvantages for each of them. Chaotic algorithms will be used because they have advantages of its casual Conduct and sensitivity to values of parameters and primary conditions that enable chaotic algorithms to fulfill the cryptographic systems. We co...
1 CitationsSource
#1Mahmoud Mohamed Farouk (Menoufia University)H-Index: 6
#2Osama S. FaragallahH-Index: 16
Last. Hala S. El-sayed (Menoufia University)H-Index: 9
view all 5 authors...
This paper presents an enhanced audio speech cryptosystem based on three enhancements for permutation and substitution of speech segments using multiple secret keys and permutations in time and transform domains. The first enhancement method is based on repeating the first and last permutation steps in both encryption/decryption procedures for several times to enhance the security level. The second and third enhancement methods are based on adding two additional secret keys generated from the or...
Source