期刊文献+
共找到34篇文章
< 1 2 >
每页显示 20 50 100
A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models 被引量:1
1
作者 Naglaa F.Soliman Fatma e.Fadl-Allah +3 位作者 Walid el-Shafai Mahmoud I.Aly Maali Alabdulhafith fathi e.abd el-samie 《Computers, Materials & Continua》 SCIE EI 2024年第4期201-241,共41页
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication ... The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication standards.The Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and integrity.The data need a space away fromunauthorized access,modification,or deletion.These requirements are to be fulfilled by digital image watermarking and encryption.This paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication standard.It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver side.The proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD watermarking.In addition,image encryption is implemented based on chaos and DNA encoding.The encrypted watermarked images are then transmitted through the wireless SC-FDMA system.The linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images.Two subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this paper.The study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images.In addition,different variants of SC-FDMA based on the Discrete Wavelet Transform(DWT),Discrete Cosine Transform(DCT),and Fast Fourier Transform(FFT)are considered and compared for the image communication task.The simulation results and comparison demonstrate clearly that DWT-SC-FDMAis better suited to the transmission of the digital images in the case of PedestrianAchannels,while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels. 展开更多
关键词 Cybersecurity applications image transmission channel models modulation techniques watermarking and encryption
在线阅读 下载PDF
Optimization of Cooperative RelayingMolecular Communications for Nanomedical Applications
2
作者 eman S.Attia Ashraf A.M.Khalaf +4 位作者 fathi e.abd el-samie Saied M.abd el-atty Konstantinos A.Lizos Osama Alfarraj Heba M.el-Hoseny 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1259-1275,共17页
Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,becaus... Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,because the MCvD is unreliable and there exists molecular noise and inter symbol interference(ISI),cooperative nano-relays can acquire the reliability for drug delivery to targeted diseased cells,especially if the separation distance between the nano transmitter and nano receiver is increased.In this work,we propose an approach for optimizing the performance of the nano system using cooperative molecular communications with a nano relay scheme,while accounting for blood flow effects in terms of drift velocity.The fractions of the molecular drug that should be allocated to the nano transmitter and nano relay positioning are computed using a collaborative optimization problem solved by theModified Central Force Optimization(MCFO)algorithm.Unlike the previous work,the probability of bit error is expressed in a closed-form expression.It is used as an objective function to determine the optimal velocity of the drug molecules and the detection threshold at the nano receiver.The simulation results show that the probability of bit error can be dramatically reduced by optimizing the drift velocity,detection threshold,location of the nano-relay in the proposed nano system,and molecular drug budget. 展开更多
关键词 Nanomedical system molecular communication cooperative relay OPTIMIZATION
在线阅读 下载PDF
Fair subcarrier-power allocation scheme for multiuser multicarrier systems 被引量:5
3
作者 Mohammed abd-elnaby Germien G.Sedhom +2 位作者 Nagy W.Messiha Xu Zhu fathi e.abd el-samie 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第8期3033-3041,共9页
The main objective of multiuser orthogonal frequency division multiple access(MU-OFDM) is to maximize the total system capacity in wireless communication systems. Thus, the problem in MU-OFDM system is the adaptive al... The main objective of multiuser orthogonal frequency division multiple access(MU-OFDM) is to maximize the total system capacity in wireless communication systems. Thus, the problem in MU-OFDM system is the adaptive allocation of the resources(subcarriers, bits and power) to different users subject to several restrictions to maximize the total system capacity. In this work, a proposed subcarrier allocation algorithm was presented to assign the subcarriers with highest channel gain to the users. After the subcarrier allocation, subcarrier gain-based power allocation(SGPA) was employed for power and bit loading. The simulation results show that the proposed subcarrier-power allocation scheme can achieve high total system capacity and good fairness in allocating the resources to the users with slightly high computational complexity compared to the existing subcarrier allocation algorithms. 展开更多
关键词 multiuser orthogonal frequency division multiple access (MU-OFDM) subcarrier-allocation power allocation FAIRNESS capacity
在线阅读 下载PDF
Efficient Deep-Learning-Based Autoencoder Denoising Approach for Medical Image Diagnosis 被引量:4
4
作者 Walid el-Shafai Samy abd el-Nabi +4 位作者 el-Sayed Mel-Rabaie Anas M.Ali Naglaa F.Soliman Abeer D.Algarni fathi e.abd el-samie 《Computers, Materials & Continua》 SCIE EI 2022年第3期6107-6125,共19页
Effective medical diagnosis is dramatically expensive,especially in third-world countries.One of the common diseases is pneumonia,and because of the remarkable similarity between its types and the limited number of me... Effective medical diagnosis is dramatically expensive,especially in third-world countries.One of the common diseases is pneumonia,and because of the remarkable similarity between its types and the limited number of medical images for recent diseases related to pneumonia,themedical diagnosis of these diseases is a significant challenge.Hence,transfer learning represents a promising solution in transferring knowledge from generic tasks to specific tasks.Unfortunately,experimentation and utilization of different models of transfer learning do not achieve satisfactory results.In this study,we suggest the implementation of an automatic detectionmodel,namelyCADTra,to efficiently diagnose pneumonia-related diseases.This model is based on classification,denoising autoencoder,and transfer learning.Firstly,pre-processing is employed to prepare the medical images.It depends on an autoencoder denoising(AD)algorithm with a modified loss function depending on a Gaussian distribution for decoder output to maximize the chances for recovering inputs and clearly demonstrate their features,in order to improve the diagnosis process.Then,classification is performed using a transfer learning model and a four-layer convolution neural network(FCNN)to detect pneumonia.The proposed model supports binary classification of chest computed tomography(CT)images and multi-class classification of chest X-ray images.Finally,a comparative study is introduced for the classification performance with and without the denoising process.The proposed model achieves precisions of 98%and 99%for binary classification and multi-class classification,respectively,with the different ratios for training and testing.To demonstrate the efficiency and superiority of the proposed CADTra model,it is compared with some recent state-of-the-art CNN models.The achieved outcomes prove that the suggested model can help radiologists to detect pneumonia-related diseases and improve the diagnostic efficiency compared to the existing diagnosis models. 展开更多
关键词 Medical images CADTra AD CT and X-ray images autoencoder
在线阅读 下载PDF
An Efficient CNN-Based Automated Diagnosis Framework from COVID-19 CT Images 被引量:2
5
作者 Walid el-Shafai Noha A.el-Hag +4 位作者 Ghada M.el-Banby Ashraf A.M.Khalaf Naglaa F.Soliman Abeer D.Algarni fathi e.abd el-samie 《Computers, Materials & Continua》 SCIE EI 2021年第10期1323-1341,共19页
Corona Virus Disease-2019(COVID-19)continues to spread rapidly in the world.It has dramatically affected daily lives,public health,and the world economy.This paper presents a segmentation and classification framework ... Corona Virus Disease-2019(COVID-19)continues to spread rapidly in the world.It has dramatically affected daily lives,public health,and the world economy.This paper presents a segmentation and classification framework of COVID-19 images based on deep learning.Firstly,the classification process is employed to discriminate between COVID-19,non-COVID,and pneumonia by Convolutional Neural Network(CNN).Then,the segmentation process is applied for COVID-19 and pneumonia CT images.Finally,the resulting segmented images are used to identify the infected region,whether COVID-19 or pneumonia.The proposed CNN consists of four Convolutional(Conv)layers,four batch normalization layers,and four Rectified Linear Units(ReLUs).The sizes of Conv layer used filters are 8,16,32,and 64.Four maxpooling layers are employed with a stride of 2 and a 2×2 window.The classification layer comprises a Fully-Connected(FC)layer and a soft-max activation function used to take the classification decision.A novel saliencybased region detection algorithm and an active contour segmentation strategy are applied to segment COVID-19 and pneumonia CT images.The acquired findings substantiate the efficacy of the proposed framework for helping the specialists in automated diagnosis applications. 展开更多
关键词 CLASSIFICATION SEGMENTATION COVID-19 CNN deep learning diagnosis applications
在线阅读 下载PDF
An Efficient Medical Image Deep Fusion Model Based on Convolutional Neural Networks 被引量:1
6
作者 Walid el-Shafai Noha A.el-Hag +5 位作者 Ahmed Sedik Ghada elbanby fathi e.abd el-samie Naglaa F.Soliman Hussah Nasser Aleisa Mohammed e.abdel Samea 《Computers, Materials & Continua》 SCIE EI 2023年第2期2905-2925,共21页
Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and therapy.Deep learning provides a high performance for several medical image analysis app... Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and therapy.Deep learning provides a high performance for several medical image analysis applications.This paper proposes a deep learning model for the medical image fusion process.This model depends on Convolutional Neural Network(CNN).The basic idea of the proposed model is to extract features from both CT and MR images.Then,an additional process is executed on the extracted features.After that,the fused feature map is reconstructed to obtain the resulting fused image.Finally,the quality of the resulting fused image is enhanced by various enhancement techniques such as Histogram Matching(HM),Histogram Equalization(HE),fuzzy technique,fuzzy type,and Contrast Limited Histogram Equalization(CLAHE).The performance of the proposed fusion-based CNN model is measured by various metrics of the fusion and enhancement quality.Different realistic datasets of different modalities and diseases are tested and implemented.Also,real datasets are tested in the simulation analysis. 展开更多
关键词 Image fusion CNN deep learning feature extraction evaluation metrics medical diagnosis
在线阅读 下载PDF
Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms 被引量:1
7
作者 Safaa el-Gazar Walid el-Shafai +4 位作者 Ghada el-Banby Hesham F.A.Hamed Gerges M.Salama Mohammed abd-elnaby fathi e.abd el-samie 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期87-102,共16页
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades.It achieves safe access to systems using biometrics instead of the traditional passwords.The utilization of ... Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades.It achieves safe access to systems using biometrics instead of the traditional passwords.The utilization of a biometric in its original format makes it usable only once.Therefore,a cancelable biometric template should be used,so that it can be replaced when it is attacked.Cancelable biometrics aims to enhance the security and privacy of biometric authentication.Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates.In this paper,a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification systems.The considered biometric in this paper is the speech signal.The speech signal is transformed into its spectrogram.Then,the spectrogram is encrypted using two cascaded optical encryption algorithms.The first algorithm is the Optical Scanning Holography(OSH)for its efficiency as an encryption tool.The OSH encrypted spectrogram is encrypted using Double Random Phase Encoding(DRPE)by implementing two Random Phase Masks(RPMs).After the two cascaded optical encryption algorithms,the cancelable template is obtained.The verification is implemented through correlation estimation between enrolled and test templates in their encrypted format.If the correlation value is larger than a threshold value,the user is authorized.The threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two curves.The implementation of optical encryption is adopted using its software rather than the optical setup.The efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation results.It can improve the biometric data security without deteriorating the recognition accuracy.Simulation results give close-to-zero This values for the Equal Error Rate(EER)and close-to-one values for the Area under Receiver Operator Characteristic(AROC)curve. 展开更多
关键词 Cancelable biometrics SPECTROGRAM OSH DRPE EER AROC
在线阅读 下载PDF
Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection 被引量:1
8
作者 Mostafa Nassar Anas M.Ali +5 位作者 Walid el-Shafai Adel Saleeb fathi e.abd el-samie Naglaa F.Soliman Hussah Nasser Aleisa Hossam eldin H.Ahmed 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2235-2247,共13页
Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using ma... Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using machine learning and deep learning.The significant advantage of deep learning is that it is highly efficient,but it needs a large training time with a lot of data.Therefore,in this paper,we present a new feature reduction strategy based on Distributed Cumulative Histograms(DCH)to distinguish between dataset features to locate the most effective features.Cumulative histograms assess the dataset instance patterns of the applied features to identify the most effective attributes that can significantly impact the classification results.Three different models for detecting attacks using Convolutional Neural Network(CNN)and Long Short-Term Memory Network(LSTM)are also proposed.The accuracy test of attack detection using the hybrid model was 98.96%on the UNSW-NP15 dataset.The proposed model is compared with wrapper-based and filter-based Feature Selection(FS)models.The proposed model reduced classification time and increased detection accuracy. 展开更多
关键词 Feature selection DCH LSTM CNN security systems
在线阅读 下载PDF
An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics
9
作者 Naglaa F.Soliman Abeer D.Algarni +2 位作者 Walid el-Shafai fathi e.abd el-samie Ghada M.el Banby 《Computers, Materials & Continua》 SCIE EI 2021年第11期1571-1595,共25页
Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things(IoT)networks.The objective of using cancelable biometrics is to save the... Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things(IoT)networks.The objective of using cancelable biometrics is to save the original ones from hacking attempts.A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications.The original biometric is blurred with two co-prime operators.Hence,it can be recovered as the Greatest Common Divisor(GCD)between its two blurred versions.Minimal changes if induced in the biometric image prior to processing with co-prime operators prevents the recovery of the original biometric image through a GCD operation.Hence,the ability to change cancelable templates is guaranteed,since the owner of the biometric can pre-determine and manage the minimal change induced in the biometric image.Furthermore,we test the utility of the proposed algorithm in the single-and multi-biometric scenarios.The multi-biometric scenario depends on compressing face,fingerprint,iris,and palm print images,simultaneously,to generate the cancelable templates.Evaluation metrics such as Equal Error Rate(EER)and Area and Receiver Operator Characteristic curve(AROC)are considered.Simulation results on single-and multi-biometric scenarios show high AROC values up to 99.59%,and low EER values down to 0.04%. 展开更多
关键词 CLOUD IOT cancelable biometrics GCD single-and multi-biometrics security applications
在线阅读 下载PDF
Deep CNN Model for Multimodal Medical Image Denoising
10
作者 Walid el-Shafai Amira A.Mahmoud +7 位作者 Anas M.Ali el-Sayed M.el-Rabaie Taha e.Taha Osama F.Zahran Adel S.el-Fishawy Naglaa F.Soliman Amel A.Alhussan fathi e.abd el-samie 《Computers, Materials & Continua》 SCIE EI 2022年第11期3795-3814,共20页
In the literature,numerous techniques have been employed to decrease noise in medical image modalities,including X-Ray(XR),Ultrasonic(Us),Computed Tomography(CT),Magnetic Resonance Imaging(MRI),and Positron Emission T... In the literature,numerous techniques have been employed to decrease noise in medical image modalities,including X-Ray(XR),Ultrasonic(Us),Computed Tomography(CT),Magnetic Resonance Imaging(MRI),and Positron Emission Tomography(PET).These techniques are organized into two main classes:the Multiple Image(MI)and the Single Image(SI)techniques.In the MI techniques,images usually obtained for the same area scanned from different points of view are used.A single image is used in the entire procedure in the SI techniques.SI denoising techniques can be carried out both in a transform or spatial domain.This paper is concerned with single-image noise reduction techniques because we deal with single medical images.The most well-known spatial domain noise reduction techniques,including Gaussian filter,Kuan filter,Frost filter,Lee filter,Gabor filter,Median filter,Homomorphic filter,Speckle reducing anisotropic diffusion(SRAD),Nonlocal-Means(NL-Means),and Total Variation(TV),are studied.Also,the transform domain noise reduction techniques,including wavelet-based and Curvelet-based techniques,and some hybridization techniques are investigated.Finally,a deep(Convolutional Neural Network)CNN-based denoising model is proposed to eliminate Gaussian and Speckle noises in different medical image modalities.This model utilizes the Batch Normalization(BN)and the ReLU as a basic structure.As a result,it attained a considerable improvement over the traditional techniques.The previously mentioned techniques are evaluated and compared by calculating qualitative visual inspection and quantitative parameters like Peak Signal-to-Noise Ratio(PSNR),Correlation Coefficient(Cr),and system complexity to determine the optimum denoising algorithm to be applied universally.Based on the quality metrics,it is demonstrated that the proposed deep CNN-based denoising model is efficient and has superior denoising performance over the traditionaldenoising techniques. 展开更多
关键词 Image enhancement medical imaging speckle noise Gaussian noise denoising filters CNN denoising
在线阅读 下载PDF
A Hybrid Security Framework for Medical Image Communication
11
作者 Walid el-Shafai Hayam A.abd el-Hameed +3 位作者 Ashraf A.M.Khalaf Naglaa F.Soliman Amel A.Alhussan fathi e.abd el-samie 《Computers, Materials & Continua》 SCIE EI 2022年第11期2713-2730,共18页
Authentication of the digital image has much attention for the digital revolution.Digital image authentication can be verified with image watermarking and image encryption schemes.These schemes are widely used to prot... Authentication of the digital image has much attention for the digital revolution.Digital image authentication can be verified with image watermarking and image encryption schemes.These schemes are widely used to protect images against forgery attacks,and they are useful for protecting copyright and rightful ownership.Depending on the desirable applications,several image encryption and watermarking schemes have been proposed to moderate this attention.This framework presents a new scheme that combines a Walsh Hadamard Transform(WHT)-based image watermarking scheme with an image encryption scheme based on Double Random Phase Encoding(DRPE).First,on the sender side,the secret medical image is encrypted using DRPE.Then the encrypted image is watermarking based on WHT.The combination between watermarking and encryption increases the security and robustness of transmitting an image.The performance evaluation of the proposed scheme is obtained by testing Structural Similarity Index(SSIM),Peak Signal-to-Noise Ratio(PSNR),Normalized cross-correlation(NC),and Feature Similarity Index(FSIM). 展开更多
关键词 Walsh hadamard transform WATERMARKING ENCRYPTION double random phase encoding structural similarity index
在线阅读 下载PDF
Analysis of BrainMRI: AI-Assisted Healthcare Framework for the Smart Cities
12
作者 Walid el-Shafai Randa Ali +3 位作者 Ahmed Sedik Taha el-Sayed Taha Mohammed abd-elnaby fathi e.abd el-samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1843-1856,共14页
The use of intelligent machines to work and react like humans is vital in emerging smart cities.Computer-aided analysis of complex and huge MRI(Mag-netic Resonance Imaging)scans is very important in healthcare applica... The use of intelligent machines to work and react like humans is vital in emerging smart cities.Computer-aided analysis of complex and huge MRI(Mag-netic Resonance Imaging)scans is very important in healthcare applications.Among AI(Artificial Intelligence)driven healthcare applications,tumor detection is one of the contemporary researchfields that have become attractive to research-ers.There are several modalities of imaging performed on the brain for the pur-pose of tumor detection.This paper offers a deep learning approach for detecting brain tumors from MR(Magnetic Resonance)images based on changes in the division of the training and testing data and the structure of the CNN(Convolu-tional Neural Network)layers.The proposed approach is carried out on a brain tumor dataset from the National Centre of Image-Guided Therapy,including about 4700 MRI images of ten brain tumor cases with both normal and abnormal states.The dataset is divided into test,and train subsets with a ratio of the training set to the validation set of 70:30.The main contribution of this paper is introdu-cing an optimum deep learning structure of CNN layers.The simulation results are obtained for 50 epochs in the training phase.The simulation results reveal that the optimum CNN architecture consists of four layers. 展开更多
关键词 Healthcare smart cities clinical automation CNN machine learning brain tumor medical diagnosis
在线阅读 下载PDF
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
13
作者 Lamiaa A.Abou elazm Walid el-Shafai +6 位作者 Sameh Ibrahim Mohamed G.egila H.Shawkey Mohamed K.H.elsaid Naglaa F.Soliman Hussah Nasser Aleisa fathi e.abd el-samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期929-955,共27页
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the secur... Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the security of these sys-tems.Biometric systems provide sufficient protection and privacy for users.The recently-introduced cancellable biometric recognition systems have not been investigated in the presence of different types of attacks.In addition,they have not been studied on different and large biometric datasets.Another point that deserves consideration is the hardware implementation of cancellable biometric recognition systems.This paper presents a suggested hybrid cancellable biometric recognition system based on a 3D chaotic cryptosystem.The rationale behind the utilization of the 3D chaotic cryptosystem is to guarantee strong encryption of biometric templates,and hence enhance the security and privacy of users.The suggested cryptosystem adds significant permutation and diffusion to the encrypted biometric templates.We introduce some sort of attack analysis in this paper to prove the robustness of the proposed cryptosystem against attacks.In addition,a Field Programmable Gate Array(FPGA)implementation of the pro-posed system is introduced.The obtained results with the proposed cryptosystem are compared with those of the traditional encryption schemes,such as Double Random Phase Encoding(DRPE)to reveal superiority,and hence high recogni-tion performance of the proposed cancellable biometric recognition system.The obtained results prove that the proposed cryptosystem enhances the security and leads to better efficiency of the cancellable biometric recognition system in the presence of different types of attacks. 展开更多
关键词 Information security cancellable biometric recognition systems CRYPTANALYSIS 3D chaotic map ENCRYPTION FPGA
在线阅读 下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
14
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni fathi e.abd el-samie Walid el-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box)
在线阅读 下载PDF
A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications
15
作者 Walid el-Shafai Fatma Khallaf +2 位作者 el-Sayed M.el-Rabaie fathi e.abd el-samie Iman Almomani 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3599-3618,共20页
This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discre... This paper presents a robust multi-stage security solution based on fusion,encryption,and watermarking processes to transmit color healthcare images,efficiently.The presented solution depends on the features of discrete cosine transform(DCT),lifting wavelet transform(LWT),and singular value decomposition(SVD).The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks.During watermark embedding,the host color medical image is transformed into four sub-bands by employing three stages of LWT.The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation.Furthermore,a fusion process is used for combining different watermarks into a single watermark image.This single fused image is then ciphered using Deoxyribose Nucleic Acid(DNA)encryption to strengthen the security.Then,the DNA-ciphered fused watermark is embedded in the host medical image by applying the suggested watermarking technique to obtain the watermarked image.The main contribution of this work is embedding multiple watermarks to prevent identity theft.In the presence of different multimedia attacks,several simulation tests on different colormedical images have been performed.The results prove that the proposed security solution achieves a decent imperceptibility quality with high Peak Signal-to-Noise Ratio(PSNR)values and high correlation between the extracted and original watermark images.Moreover,the watermark image extraction process succeeds in achieving high efficiency in the presence of attacks compared with related works. 展开更多
关键词 Medical images DNA encryption digital image watermarking FUSION healthcare applications
在线阅读 下载PDF
Proposed Privacy Preservation Technique for Color Medical Images
16
作者 Walid el-Shafai Hayam A.abd el-Hameed +4 位作者 Noha A.el-Hag Ashraf A.M.Khalaf Naglaa F.Soliman Hussah Nasser Aleisa fathi e.abd el-samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期719-732,共14页
Nowadays,the security of images or information is very important.This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security.First,the secret medical image is en... Nowadays,the security of images or information is very important.This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security.First,the secret medical image is encrypted using Advanced Encryption Standard(AES)algorithm.Then,the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit(LSB)watermarking algorithm.After that,the encrypted secret medical image with the secret report is concealed in a cover medical image,using Kekre’s Median Codebook Generation(KMCG)algorithm.Afterwards,the stego-image obtained is split into 16 parts.Finally,it is sent to the receiver.We adopt this strategy to send the secret medical image and report over a network securely.The proposed technique is assessed with different encryption quality metrics including Peak Signal-to-Noise Ratio(PSNR),Correlation Coefficient(Cr),Fea-ture Similarity Index Metric(FSIM),and Structural Similarity Index Metric(SSIM).Histogram estimation is used to confirm the matching between the secret medical image before and after transmission.Simulation results demonstrate that the proposed technique achieves good performance with high quality of the received medical image and clear image details in a very short processing time. 展开更多
关键词 LSB steganography AES algorithm KMCG algorithm
在线阅读 下载PDF
Efficient Segmentation Approach for Different Medical Image Modalities
17
作者 Walid el-Shafai Amira A.Mahmoud +6 位作者 el-Sayed M.el-Rabaie Taha e.Taha Osama F.Zahran Adel S.el-Fishawy Naglaa F.Soliman Amel A.Alhussan fathi e.abd el-samie 《Computers, Materials & Continua》 SCIE EI 2022年第11期3119-3135,共17页
This paper presents a study of the segmentation of medical images.The paper provides a solid introduction to image enhancement along with image segmentation fundamentals.In the first step,the morphological operations ... This paper presents a study of the segmentation of medical images.The paper provides a solid introduction to image enhancement along with image segmentation fundamentals.In the first step,the morphological operations are employed to ensure image detail protection and noise-immunity.The objective of using morphological operations is to remove the defects in the texture of the image.Secondly,the Fuzzy C-Means(FCM)clustering algorithm is used to modify membership function based only on the spatial neighbors instead of the distance between pixels within local spatial neighbors and cluster centers.The proposed technique is very simple to implement and significantly fast since it is not necessary to compute the distance between the neighboring pixels and the cluster centers.It is also efficient when dealing with noisy images because of its ability to efficiently improve the membership partition matrix.Simulation results are performed on different medical image modalities.Ultrasonic(Us),X-ray(Mammogram),Computed Tomography(CT),Positron Emission Tomography(PET),and Magnetic Resonance(MR)images are the main medical image modalities used in this work.The obtained results illustrate that the proposed technique can achieve good results with a short time and efficient image segmentation.Simulation results on different image modalities show that the proposed technique can achieve segmentation accuracies of 98.83%,99.71%,99.83%,99.85%,and 99.74%for Us,Mammogram,CT,PET,and MRI images,respectively. 展开更多
关键词 Image segmentation ultrasonic mammogram CT PET MRI morphological operations FCM active contours
在线阅读 下载PDF
Hybrid Segmentation Approach for Different Medical Image Modalities
18
作者 Walid el-Shafai Amira A.Mahmoud +6 位作者 el-Sayed M.el-Rabaie Taha e.Taha Osama F.Zahran Adel S.el-Fishawy Naglaa F.Soliman Amel A.Alhussan fathi e.abd el-samie 《Computers, Materials & Continua》 SCIE EI 2022年第11期3454-3471,共18页
The segmentation process requires separating the image region into sub-regions of similar properties.Each sub-region has a group of pixels having the same characteristics,such as texture or intensity.This paper sugges... The segmentation process requires separating the image region into sub-regions of similar properties.Each sub-region has a group of pixels having the same characteristics,such as texture or intensity.This paper suggests an efficient hybrid segmentation approach for different medical image modalities based on particle swarm optimization(PSO)and improved fast fuzzy C-means clustering(IFFCM)algorithms.An extensive comparative study on different medical images is presented between the proposed approach and other different previous segmentation techniques.The existing medical image segmentation techniques incorporate clustering,thresholding,graph-based,edge-based,active contour,region-based,and watershed algorithms.This paper extensively analyzes and summarizes the comparative investigation of these techniques.Finally,a prediction of the improvement involves the combination of these techniques is suggested.The obtained results demonstrate that the proposed hybrid medical image segmentation approach provides superior outcomes in terms of the examined evaluation metrics compared to the preceding segmentation techniques. 展开更多
关键词 Image segmentation ultrasonic images X-ray images CT images PET images MR images fuzzy c-mean morphological operations active contour
在线阅读 下载PDF
Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications
19
作者 Hend Ibrahim Abeer D.Algarni +3 位作者 Mahmoud abdalla Walid el-Shafai fathi e.abd el-samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第5期3293-3318,共26页
Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided ... Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided media with light.This system requires multi-carrier modulation such as Orthogonal Frequency Division Multiplexing(OFDM).This paper studies optical OFDM performance based on Intensity Modulation with Direct Detection(IM/DD)system.This system requires a non-negativity constraint.The paper presents a framework for wireless optical OFDM system that comprises(IM/DD)with different forms,Direct Current biased Optical OFDM(DCO-OFDM),Asymmetrically Clipped Optical OFDM(ACO-OFDM),Asymmetrically DC-biased Optical OFDM(ADO-OFDM),and Flip-OFDM.It also considers channel coding as a tool for error control,channel equalization for reducing deterioration due to channel effects,and investigation of the turbulence effects.The evaluation results of the proposed framework reveal enhancement of performance.The performance of the IM/DD-OFDM system is investigated over different channel models such as AWGN,log-normal turbulence channel model,and ceiling bounce channel model.The simulation results show that the BER performance of the IM/DD-OFDM communication system is enhanced while the fading strength is decreased.The results reveal also that Hamming codes,BCH codes,and convolutional codes achieve better BER performance.Also,two algorithms of channel estimation and equalization are considered and compared.These algorithms include the Least Squares(LS)and the Minimum Mean Square Error(MMSE).The simulation results show that the MMSE algorithm gives better BER performance than the LS algorithm. 展开更多
关键词 Optical communication systems OWC IM/DD OFDM MMSE LS ADO-OFDM DCO-OFDM ACO-OFDM
在线阅读 下载PDF
Efficient Forgery Detection Approaches for Digital Color Images
20
作者 Amira Baumy Abeer D.Algarni +3 位作者 Mahmoud abdalla Walid el-Shafai fathi e.abd el-samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第5期3257-3276,共20页
This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data... This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data communicated over networks. Hence, there is an urgent need fordeveloping efficient image forgery detection algorithms. Two main types offorgery are considered in this paper: splicing and copy-move. Splicing isperformed by inserting a part of an image into another image. On the otherhand, copy-move forgery is performed by copying a part of the image intoanother position in the same image. The proposed approach for splicingdetection is based on the assumption that illumination between the originaland tampered images is different. To detect the difference between the originaland tampered images, the homomorphic transform separates the illuminationcomponent from the reflectance component. The illumination histogramderivative is used for detecting the difference in illumination, and henceforgery detection is accomplished. Prior to performing the forgery detectionprocess, some pre-processing techniques, including histogram equalization,histogram matching, high-pass filtering, homomorphic enhancement, andsingle image super-resolution, are introduced to reinforce the details andchanges between the original and embedded sections. The proposed approachfor copy-move forgery detection is performed with the Speeded Up RobustFeatures (SURF) algorithm, which extracts feature points and feature vectors. Searching for the copied partition is accomplished through matchingwith Euclidian distance and hierarchical clustering. In addition, some preprocessing methods are used with the SURF algorithm, such as histogramequalization and single-mage super-resolution. Simulation results proved thefeasibility and the robustness of the pre-processing step in homomorphicdetection and SURF detection algorithms for splicing and copy-move forgerydetection, respectively. 展开更多
关键词 Image forgery splicing algorithm copy-move algorithm histogram matching homomorphic enhancement SISR SURF
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部