Browsing by Author "El-Bendary, Mohsen A. M"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item Complexity considerations: efficient image transmission over mobile communications channels(Springer, 2019-06) El-Bendary, Mohsen A. M; Abou El-Azm, A. EIn this paper the computational complexity of the image transmission over mobile communications channel is investigated. The computational complexity due to the amount of transmitted data and the utilized data protection schemes is analyzed over wireless channel with the different image transmission scenarios. The proposed secured and efficient protection technique is presented in this research work with lower computational complexity. The presented technique is based on chaotic-Baker encryption which is utilized as an interleaver to randomize the data packet in the proposed secured interleaved channel coding technique. The proposed technique is evaluated utilizing convolutional codes with different constraint lengths and single error correction block code. Different images with the size variation are utilized for evaluating the proposed image transmission scenarios. Numerical analysis of the different scenarios is presented. The secret key generation of chaotic-Baker encryption is discussed; it can be generated automatically or manually. Several computer simulation experiments are carried out to evaluate the proposed techniques performance. Different objective measures error based metrics are used such as the Bit Error Rate (BER), Peak Signal to Noise Ratio (PSNR) and Number of Lost packet percentage (NLP%) to measure the error performance of the proposed technique and quality of the received images. Simulation results reveal a good performance and the superiority of the proposed technique with lower computational complexity of the proposed image transmission scenarios.Item Efficient audio integrity verification algorithm using discrete cosine transform(SPRINGER, 2016-03) Faragallah, Osama S; Abd El-Samie, Fathi E; El-Bendary, Mohsen A. M; El-sayed, Hala S; Kelash, Hamdy M; Ayad, Nabil M; Nassar, Sabry SAudio recordings have been used as evidence for long times. Multimedia processing advancement makes it difficult to be completely sure about what is heard is the truth. This paper presents a promising approach for integrity verification of recorded audio signals using discrete cosine transform. This approach is based on self embedding concept which embeds block-based marks extracted from the same audio signal after being transformed into 2-D format into other blocks according to a specific algorithm. After the self-embedding process, the data is converted back into 1-D style which represents a marked audio signal. The 1-D audio signal is converted into a 2-D format and then converted back into a 1-D format using the popular lexicographic ordering scheme utilized in image processing. Reverse processes are executed to extract the verification marks from the audio signal throughout the integrity verification process. Based on the extracted audio signal properties, the integrity of the marked audio signal is evaluated. Different audio processing tasks and attacks are implemented to examine the suitability of the proposed algorithm for verifying the integrity of high-confidentiality recorded audio data. The results show that the efficient ability of the proposed approach to verify integrity and detect attacks.Item FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks(Springer, 2017-12) El-Bendary, Mohsen A. MIn this research paper, robust and reliable encrypted steganography technique with the error control schemes is presented. It also, investigates the performance of this technique with existing different noises and attacks. The paper presents a powerful security algorithm through merging between the data hiding and encryption techniques. This security merging technique aims to improve and strengthen the image security through its transmission over a wireless channel. Error performance of the presented security algorithm is considered also, and the different error control schemes are utilized to encode the transmitted packets. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The chaos based encryption algorithms are considered efficient and secured image encryption algorithms. In this research work a confidential image is embedded into a cover image using the data hiding Least Significant Bit (LSB) Steganography technique and then the stego image is encrypted using two dimensional chaotic map encryption tool. The Logistic map and Chaotic Baker map encryption techniques are utilized for this purpose to produce a multi-level high secure algorithm for sensitive secret image transmission. The computer simulation experiments reveal that the chaotic Baker scenario resist the noise and attacks more than another scenario. The Median filter is utilized to enhance the extracted message quality in existence the Pepper-Salt noise. The encrypted stego signal performance is evaluated over the AWGN channel and different attacks. To improve the extraction of Logistic steganography, the FEC is employed for this purpose and to decrease the required SNR which permits the successfully embedded image extraction. These different error control techniques are utilized to improve the presented algorithm reliability over the wireless channels. There are several metrics are used to measure the extracted images quality such as the correlation coefficient, mean square error, and peak signal to noise ratio. Also, the number of lost packet is used as data loss attack and to evaluate the wireless link efficiency. Different image analyses and comparisons are verified to examine the suitability of proposed algorithms for securing a high sensitive image data through its transmission over wireless channel at different noise levels.