A cancelable biometric security framework based on RNA encryption and genetic algorithms

…, W El-Shafai, HMA Elkamchouchi, A ELfahar… - IEEE …, 2022 - ieeexplore.ieee.org
Cancelable biometric recognition techniques play a vital role in the privacy and security of
remote surveillance systems to keep the genuine users’ confidential data safe and away from …

A hybrid medical image cryptosystem based on 4D-hyperchaotic S-boxes and logistic maps

SM Ahmed, H MA Elkamchouchi, A Elfahar… - Multimedia Tools and …, 2024 - Springer
Privacy and confidentiality are essential for any patient-related information, including medical
images. In this paper, a novel image encryption technique for medical images is introduced…

Open Source Intelligence Driven Moving Target Defense for Secure Software-defined WAN: a Game Theoretic Approach

…, M Azab, A ELfahar - 2023 IEEE Global …, 2023 - ieeexplore.ieee.org
The recent devastating cyberattacks targeting enterprise networks have raised many concerns
regarding their reliability, resilience, and ability to adapt to changes. The heterogeneous …

Ant colony approach for optimum multiuser detector of MC-CDMA system

A Magdy, S Elnoubi, A Elfahar - 2008 National Radio Science …, 2008 - ieeexplore.ieee.org
This paper introduces an application of the Ant Colony Optimization (ACO) in the area of
wireless communications. The application is designing and analyzing a low complexity …

An Advanced Deep Learning Medical Image Recognition and Diagnosis of Respiratory System Viruses

MB Tayel, AMM El Fahar… - … Conference on Computer …, 2022 - ieeexplore.ieee.org
Respiratory infections are a confusing and time-consuming task that caused recently a
pandemic that affected the whole world. One of the pandemics was COVID-19 that has exposed …

[CITATION][C] List of papers

G Boeck, H Haddara, SM Rashad, MA Aziz, AM Attiya… - ieeexplore.ieee.org
… SH Zainud-Deen, adel Z. Botoros, Mourad S. Ibrahim … Elfahar

Lightweight Medical Image Encrypting and Decrypting Algorithm Based on the 3D Intertwining Logistic Map

H Bourekouche, S Belkacem… - International Journal of …, 2023 - dergipark.org.tr
The quantity of medical image data accessible for analysis is increasing because of
advancements in telehealth services. Therefore, effective cryptographic solutions must be …

A Fingerprint Based Novel Cancelable Biometric Authentication Technique

AR KR, S Karthik, BV Vineeth… - 2023 3rd Asian …, 2023 - ieeexplore.ieee.org
In recent years, the usage of diverse biometric technologies for reliable automatic human
recognition has grown at an exponential rate. There is rising concern that, with the widespread …

[PDF][PDF] Authentication Mechanisms in Computer Network Protocols

MAS Ahmed - 2018 - researchgate.net
According to the fast progression of digital communication systems, information security
becomes indispensable in data exchange and storage. Sharing information and data over …