期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Utilization of HEVC ChaCha20-Based Selective Encryption for Secure Telehealth Video Conferencing 被引量:2
1
作者 Os.ma s.Faragallah Ahmed I.sallam hala s.el-sayed 《Computers, Materials & Continua》 SCIE EI 2022年第1期831-845,共15页
Coronavirus(COVID-19)is a contagious disease that causes exceptional effect on healthcare organizationsworldwide with dangerous impact on medical services within the hospitals.Because of the fast spread of COVID-19,th... Coronavirus(COVID-19)is a contagious disease that causes exceptional effect on healthcare organizationsworldwide with dangerous impact on medical services within the hospitals.Because of the fast spread of COVID-19,the healthcare facilities could be a big source of disease infection.So,healthcare video consultations should be used to decrease face-to-face communication between clinician and patients.Healthcare video consultations may be beneficial for some COVID-19 conditions and reduce the need for faceto-face contact with a potentially positive patient without symptoms.These conditions are like top clinicians who provide remote consultations to develop treatment methodology and follow-up remotely,patients who consult about COVID-19,and those who have mild symptoms suggestive of the COVID-19 virus.Video consultations are a supplement to,and not a substitute for,telephone consultations.It may also form part of a broader COVID-19 distance care strategy that contains computerized screening,separation of possibly infectious patients within medical services,and computerized video-intensive observing of their intensive care that helps reduce mixing.Nowadays,the spread of the COVID-19 virus helps to expand the use of video healthcare consultations because it helps to exchange experiences and remote medical consultations,save costs and health procedures used to cope with the pandemic of the COVID-19 virus,and monitor the progress of treatment plans,moment by moment from a distance with precision,clarity and ease.From this perspective,this paper introduces a high-efficiency video coding(HEVC)ChaCha20-based selective encryption(SE)scheme for secure healthcare video Consultations.The proposed HEVC ChaCha20-based SE scheme uses the ChaCha20 for encrypting the sign bits of the Discrete Cosine Transform(DCT)and Motion Vector Difference(MVD)in the HEVC entropy phase.The main achievement of HEVC ChaCha20-based SE scheme is encrypting the most sensitive video bits with keeping low delay time,fixed bit rate of the HEVC,and format compliance.Experimental tests guarantee that the proposed HEVC ChaCha20-based SE scheme can ensure the confidentiality of the healthcare video consultations which has become easy to transmit through the internet. 展开更多
关键词 TELEHEALTH HEVC cahcha20 video conferencing
下载PDF
Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission 被引量:1
2
作者 Hesham Alhumyani Ibrahim Alrube +4 位作者 sameer Alsharif Ashraf Afifi Chokri Ben Amar hala s.el-sayed Os.ma s.Faragallah 《Computers, Materials & Continua》 SCIE EI 2022年第3期4657-4673,共17页
The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data.This article introduces a self-embedded ... The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data.This article introduces a self-embedded image verification and integrity scheme.The images are firstly split into dedicated segments of the same block sizes.Then,different Analytic Beta-Wavelet(ABW)orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method.ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes.We conduct a comparative study comparing the watermarked images using three kinds of ABW filters for block sizes 64×64,128×128,and 256×256.We embed the watermark using the ABW-based image watermarking method in the 2-level middle frequency sub-bands of the ABW digital image coefficients.The imperceptibility and robustness of the ABW-based image watermarking method image is evaluated based on the Peak Signal to Noise Ratio(PSNR)and Correlation coefficient values.From the implementation results,we came to know that this ABW-based image watermarking method can withstand many image manipulations compared to other existing methods. 展开更多
关键词 WATERMARKING ABW median filtering JPEG compression PSNR
下载PDF
Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel 被引量:1
3
作者 Os.ma s.Faragallah M.Farouk +1 位作者 hala s.el-sayed Mohsen A.M.El-bendary 《Computers, Materials & Continua》 SCIE EI 2022年第1期1603-1615,共13页
Audio communications and computer networking play essential roles in our daily lives,including many domains with different scopes.Developments in these technologies are quick.In consequence,there is a dire need to sec... Audio communications and computer networking play essential roles in our daily lives,including many domains with different scopes.Developments in these technologies are quick.In consequence,there is a dire need to secure these technologies up to date.This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel.Also,the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains.The discrete cosine transform(DCT),the discrete sine transform(DST),and the discrete wavelet transform(DWT)are investigated in the utilizedmultiple secret key-based audio cryptosystem.Simulation results show consistent results with the wireless noisy channel.The performance of the proposed multiple secret keys-based audio cryptosystem can be ranked concerning the employed domain as DWT,DCT,and DST transform techniques.The simulation experiments proved that the presented multiple secret keysbased audio cryptosystemfor audio signals transmitted over the wireless noisy uncorrelatedRayleigh fading channel achieves reliable and secure wireless link utilizing combined multi security layers. 展开更多
关键词 Audio communications ENCRYPTION uncorrelated Rayleigh fading channel
下载PDF
Efficient Classification of Remote Sensing Images Using Two Convolution Channels and SVM
4
作者 Khalid A.AlAfandy Hicham Omara +4 位作者 hala s.el-sayed Mohammed Baz Mohamed Lazaar Os.ma s.Faragallah Mohammed Al Achhab 《Computers, Materials & Continua》 SCIE EI 2022年第7期739-753,共15页
Remote sensing image processing engaged researchers’attentiveness in recent years,especially classification.The main problem in classification is the ratio of the correct predictions after training.Feature extraction... Remote sensing image processing engaged researchers’attentiveness in recent years,especially classification.The main problem in classification is the ratio of the correct predictions after training.Feature extraction is the foremost important step to build high-performance image classifiers.The convolution neural networks can extract images’features that significantly improve the image classifiers’accuracy.This paper proposes two efficient approaches for remote sensing images classification that utilizes the concatenation of two convolution channels’outputs as a features extraction using two classic convolution models;these convolution models are the ResNet 50 and the DenseNet 169.These elicited features have been used by the fully connected neural network classifier and support vector machine classifier as input features.The results of the proposed methods are compared with other antecedent approaches in the same experimental environments.Evaluation is based on learning curves plotted during the training of the proposed classifier that is based on a fully connected neural network and measuring the overall accuracy for the both proposed classifiers.The proposed classifiers are used with their trained weights to predict a big remote sensing scene’s classes for a developed test.Experimental results ensure that,compared with the other traditional classifiers,the proposed classifiers are further accurate. 展开更多
关键词 Remote sensing images deep learning ResNet DenseNet SVM
下载PDF
Opto-Video Encryption Based on Logistic Adjusted Sine map in FrFT
5
作者 Os.ma s.Faragallah Ashraf Afifi +4 位作者 Ibrahim F.Elashry Ensherah A.Naeem Heba M.El-Hoseny Ahmed I.sallam hala s.el-sayed 《Computers, Materials & Continua》 SCIE EI 2022年第8期3651-3663,共13页
In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This intr... In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This introduces the challenges of presenting encryption systems that can encode videos securely and efficiently at the same time.This paper presents an efficient opto-video encryption system using Logistic Adjusted Sine map(LASM)in the Fractional Fourier Transform(FrFT).In the presented opto-video LASM-based FrFT scheme,the encoded video is split into distinct frames and transformed into optical signals utilizing an optical supply.Each of the developed optical video frames is ciphered by utilizing the LASM in optical FrFT system using two-phase modulation forms on the video frame,the first in the time-domain and the second in the FrFT domain.In the end,the ciphervideo frame is spotted utilizing a CCD digital camera and transformed into a digital structure that can be managed using a computer.We test the proposed opto-video LASM-based FrFT scheme using various security tools.The outcomes demonstrate that the presented scheme can effectively encrypt and decrypt video signals.In addition,it encrypts videos with a high level of encryption qualitywithout sacrificing its resistance to noise immunity.Finally,the test outcomes demonstrate that the presented scheme is immune to known attacks. 展开更多
关键词 Optical encryption FrFT logistic-adjusted sine map
下载PDF
Secret Key Optimization for Secure Speech Communications
6
作者 Os.ma s.Faragallah Mahmoud Farouk hala s.el-sayed 《Computers, Materials & Continua》 SCIE EI 2022年第8期3025-3037,共13页
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains.The first question is,what are the best values of sub-keys that must be used to get the best quality a... This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains.The first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains.The second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s size.Finally,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains.An audio cryptosystem discussed before in recent research is applied to answer the three previous inquiries.Accurate simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better cryptosystem.For the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order equation.For the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem. 展开更多
关键词 Audio cryptosystem chaotic baker map secret key size
下载PDF
Improved RC6 Block Cipher Based on Data Dependent Rotations
7
作者 Os.ma s.Faragallah Ibrahim F.Elashry +5 位作者 Ahmed AlGhamdi Walid El-shafai s.El-Rabaie Fathi E.Abd El-samie hala s.el-sayed Mohamed A.Elaskily 《Computers, Materials & Continua》 SCIE EI 2022年第1期1921-1934,共14页
This paper introduces an Improved RC6(IRC6)cipher for data encryption based on data-dependent rotations.The proposed scheme is designed with the potential of meeting the needs of the Advanced Encryption Standard(AES).... This paper introduces an Improved RC6(IRC6)cipher for data encryption based on data-dependent rotations.The proposed scheme is designed with the potential of meeting the needs of the Advanced Encryption Standard(AES).Four parameters are used to characterize the proposed scheme.These parameters are the size of the word(w)in bits,the number of rounds(r),the length of the secret key(b)in bytes,and the size of the block(L)in bits.The main feature of IRC6 is the variable number of working registers instead of just four registers as in RC6,resulting in a variable block size for plaintext and ciphertext.The IRC6 cipher is designed to improve the robustness against attacks by increasing the diffusion for each round and providing greater security with fewer rounds.The effectiveness of the proposed IRC6 scheme is verified against theoretical attacks.The proposed IRC6 scheme depends on full diffusion and confusion mechanisms regardless of the utilized block size.The proposed IRC6 scheme saves 70%of the encryption time and 64%of the decryption time of RC6.The simulation results prove that the IRC6 achieves a better encryption/decryption time compared to the traditionalRC6.Therefore,the proposed IRC6 is anticipated to fulfill the market needs and system security requirements. 展开更多
关键词 CRYPTOGRAPHY block cipher RC6 IRC6 AES
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部