Article
Computer Science, Information Systems
Mohammed Es-Sabry, Nabil El Akkad, Mostafa Merras, Khalid Satori, Walid El-Shafai, Torki Altameem, Mostafa M. Fouda
Summary: With the increasing demand for secure data transmission, image encryption has become an important research field. This study introduces a new image encryption algorithm that uses an improved Rossler system as a keystream generator and combines DNA encoding and Baker maps for enhanced security. The results show that this method outperforms other methods in terms of both security and efficiency.
Article
Mathematics, Interdisciplinary Applications
Krishna Kumar, Satyabrata Roy, Umashankar Rawat, Shashwat Malhotra
Summary: Image encryption is crucial for transmitting sensitive images through insecure channels. This paper proposes a novel approach using shuffling technique and mapping algorithm for image encryption, which demonstrates good security characteristics according to experimental results.
CHAOS SOLITONS & FRACTALS
(2022)
Article
Optics
Alireza A. Arab, Mohammad Javad B. Rostami, Behnam Ghavami
Summary: With the advancement of science and technology, users are increasingly inclined to use visual data in medical and military applications. However, unauthorized access to personal and confidential information has become a serious problem in the digital world. This paper proposes an image encryption algorithm that combines two chaos systems, which has been experimentally proven to be more secure than traditional encryption algorithms.
Article
Computer Science, Information Systems
Nadeem Iqbal, Muhammad Hanif, Zia Ul Rehman, Muhammad Zohaib
Summary: A new image encryption scheme is proposed based on chaotic system and pixel swapping operations at both decimal and DNA levels. The scheme involves multiple steps including random pixel swapping, XOR operation, DNA encoding, and utilizing SHA-256 hash codes to enhance plaintext sensitivity, showing good security effects and resistance to various threats in simulation and performance analysis.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Artificial Intelligence
Ronnason Chinram, Mahwish Bano, Umair Habib, Pattarawan Singavananda
Summary: The purpose of this research is to develop a highly secured non-breakable fastest cryptosystem. A new efficient and fast image encryption plan based on the trigonometric chaotic map is proposed, achieving high security and speed in real-time image processing at 80 fps.
Article
Mathematics
Yassine Bouteraa, Javad Mostafaee, Mourad Kchaou, Rabeh Abbassi, Houssem Jerbi, Saleh Mobayen
Summary: This research article introduces a simple four-dimensional chaotic dynamic system and demonstrates its chaotic nature using nonlinear dynamic analysis and mathematical tools. The proposed system is compared with similar systems and applied in image encryption with standard tests conducted.
Article
Optics
Eyal Wohlgemuth, Yaron Yoffe, Pantea Nadimi Goki, Muhammad Imran, Francesco Fresi, Prajwal Doddaballapura Lakshmijayasimha, Roi Cohen, Prince Anandarajah, Luca Poti, Dan Sadot
Summary: The study introduces a novel all-optical stealth and secured transmission method, which ensures data security and confidentiality through specific technologies, allowing only authorized users to decode the normal signal, while unauthorized users are unable to obtain useful information.
Article
Computer Science, Information Systems
Ramzi Guesmi, M. A. Ben Farah
Summary: This study introduces a novel medical image encryption algorithm based on DNA masking, SHA-2 secure hash algorithm, and a new hybrid chaotic map. The algorithm strengthens the cryptosystem by utilizing DNA sequences, operations, and the chaotic hybrid map, improving information entropy, resisting various attacks, and achieving good experimental results.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Roayat Ismail, Abdel Fattah, Hager Mohamed Saqr, Mohamed E. Nasr
Summary: A Wireless Body Area Network (WBAN) plays a crucial role in medical field, but the security of medical information is a major concern due to storage and resource limitations. This study proposes an image encryption approach using adaptive DNA coding and a multi chaotic map, and the results of various analyses show that this method has a strong level of security.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Nadeem Iqbal, Ibrar Hussain, Muhammad Adnan Khan, Sagheer Abbas, Shahid Yousaf
Summary: Researchers have focused on using scrambled images for image encryption, utilizing both 2D and 3D scrambled images. To meet the increasing demands of society, a novel and speedy image encryption algorithm has been developed using 1D scrambled images. This algorithm randomly inserts pixels from a gray scale image into different positions of the scrambled image, with the Exclusive-OR operation and 2D logistic map used for diffusion effects. Performance analyses show that this scheme has desirable security effects and potential real-world applications.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Nadeem Iqbal, Rizwan Ali Naqvi, Muhammad Atif, Muhammad Adnan Khan, Muhammad Hanif, Sagheer Abbas, Dildar Hussain
Summary: An innovative image encryption scheme was developed in this research, incorporating chaotic systems, DNA computing, and chess pieces as part of the encryption process. By utilizing methods such as image scrambling, DNA encoding, DNA addition, and DNA XOR operations, the security and robustness of the encryption were enhanced. The analysis demonstrated strong security effects and resilience against various attacks, indicating promising real-world applications for the proposed image cipher.
Article
Computer Science, Information Systems
Jin Hao, Jun Mou, Li Xiong, Yingqian Zhang, Xinyu Gao, Yuwen Sha
Summary: This paper proposes a novel color image encryption algorithm based on the fractional order laser chaotic system and DNA mutation principle, analyzing the dynamic characteristics of the system and designing an encryption scheme. By scrambling the image values using chaotic sequences and Arnold matrices, and introducing DNA diffusion algorithm and DNA mutation theory for increased randomness, the algorithm demonstrates strong encryption capabilities and resistance to multiple decryption methods, enabling secure communication of digital images.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Optics
Xingyuan Wang, Yanpei Li
Summary: This paper presents an image encryption algorithm based on MOPSO, DNA encoding sequence, and Logistic map. The algorithm utilizes PSO to select sub-key sequences, and iterates based on information entropy and correlation coefficient. By using DNA encoding and Logistic map, it creates an encryption system to achieve excellent ciphertext results.
OPTICS AND LASERS IN ENGINEERING
(2021)
Article
Optics
Simiao Wang, Qiqi Peng, Baoxiang Du
Summary: This paper presents a color image encryption algorithm that combines a four-dimensional chaotic system with DNA technology. Security analysis shows that the algorithm is able to effectively resist various attacks.
OPTICS AND LASER TECHNOLOGY
(2022)
Article
Computer Science, Information Systems
Roghayeh Dehghani, Hossein Kheiri
Summary: A new image cryptography algorithm based on new second-order recursive cellular automata (RCA), DNA sequences, and hyper-chaotic system is proposed in this manuscript. Unlike the customary permutation-diffusion structure, this algorithm adopts a newly three-layer structure, diffusion-permutation-diffusion. The proposed algorithm achieves random redistribution of pixels, removal of high correlation among adjacent pixels, and increased complexity and security using new recursive cellular automata, Arnold cat's map, DNA sequences, and key stream.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Correction
Multidisciplinary Sciences
Naser Ojaroudi Parchin, Heba G. Mohamed, Karim H. Moussa, Chan Hwang See, Raed A. Abd-Alhameed, Norah Muhammad Alwadai, Ahmed S. I. Amar
SCIENTIFIC REPORTS
(2023)
Article
Multidisciplinary Sciences
Naser Ojaroudi Parchin, Heba G. G. Mohamed, Karim H. H. Moussa, Chan Hwang See, Raed R. A. Abd-Alhameed, Norah Muhammad Alwadai, Ahmed S. I. Amar
Summary: This paper presents a MIMO antenna array system for improved radiation diversity in multi-standard/multi-mode 5G communications. The design incorporates four pairs of miniaturized self-complementary antennas fed by pairs of independently coupled structures. The antenna system offers high isolation, compact profiles, and supports dual polarizations.
SCIENTIFIC REPORTS
(2023)
Article
Chemistry, Analytical
Lalbabu Prashad, Harish Chandra Mohanta, Heba G. Mohamed
Summary: A simple circular patch antenna with a partial ground plane is proposed for RF-energy harvesting at the ISM (2.45 GHz) band. The antenna resonates at 2.45 GHz with an input impedance of 50 ohms and a gain of 2.38 dBi. An L-section matching circuit with a voltage doubler is proposed to achieve excellent RF-to-DC transformation efficiency at low power input. The fabricated rectenna exhibits good characteristics in terms of return loss and realized gain, with 52% RF-to-DC transformation efficiency at 0 dBm power input. This research is important for powering low-power sensor nodes in wireless sensor applications.
Article
Green & Sustainable Science & Technology
Jagannath Patra, Nitai Pal, Harish Chandra Mohanta, Reynah Akwafo, Heba G. Mohamed
Summary: A voltage sag caused by short circuit faults is a significant power quality problem that leads to financial losses in the industrial sector. This article introduces a creative strategy based on correlation and normal probability distribution to identify weak spots in a network where voltage may drop. The method involves simulating faults randomly throughout the system, analyzing voltage dip data using probability distribution and correlation concepts, and developing the region of vulnerability. The strategy is demonstrated using an IEEE 30-bus RTS system as a case study with MATLAB software.
Article
Chemistry, Multidisciplinary
Umair Ahmad Salaria, Muhammad Ilyas Menhas, Sohaib Manzoor, Faisal Mehmood Butt, Manzoor Ellahi, Nouman Ali, Orazbekov Zhassulan, Heba G. Mohamed
Summary: This paper proposes a quasi-oppositional population-based global particle swarm optimizer with inertial weights (QPGPSO- ω ) to solve environment friendly economic dispatch problems (EDPs) based on renewable energy sources (RESs). The optimization technique is applied to solve different scenarios including cases where only RESs are used and cases where combined emission-economic dispatch (CEED) problem is considered. The results show that the proposed QPGPSO- ω algorithm outperforms other optimization methods in terms of cost effectiveness.
APPLIED SCIENCES-BASEL
(2023)
Article
Chemistry, Analytical
Aitizaz Ali, Hashim Ali, Aamir Saeed, Aftab Ahmed Khan, Ting Tin Tin, Muhammad Assam, Yazeed Yasin Ghadi, Heba G. Mohamed
Summary: This abstract presents an innovative approach that leverages blockchain technology and hybrid deep learning techniques to revolutionize healthcare systems. By integrating blockchain and hybrid deep learning, healthcare systems can improve scalability, security, and decision-making capabilities. Challenges such as computational complexity and regulatory compliance need to be addressed for successful implementation.
Article
Multidisciplinary Sciences
Sohaib Manzoor, Farrukh Mazhar, Abdullah Binaris, Moeen Uddin Hassan, Faria Rasab, Heba G. Mohamed
Summary: This paper proposes an Adaptive Symmetrical Load Balancing (ASLB) scheme to ensure fairness of load symmetry in Software Defined Wi-Fi Networks (SD-Wi-Fi), while also optimizing the flows transition process using an Analytical Hierarchal Process (AHP). Through monitoring user activity, flows are assigned to different controllers to optimize network utilization and user fairness.
Article
Chemistry, Multidisciplinary
Abdullah Zargham, Ihtisham Ul Haq, Tamara Alshloul, Samad Riaz, Ghassan Husnain, Muhammad Assam, Yazeed Yasin Ghadi, Heba G. Mohamed
Summary: In bustling streets of Pakistan, small-scale fruits and vegetables shops stand as vital hubs of daily life. With traditional methods proving to be time-consuming, an intelligent scale has been introduced to automate tasks and revolutionize the retail process. By harnessing cutting-edge technology, the scale not only determines weight but also detects and identifies the produce, enhancing the overall shopping experience.
APPLIED SCIENCES-BASEL
(2023)
Article
Chemistry, Multidisciplinary
Iqra Muneer, Mubbashar Saddique, Zulfiqar Habib, Heba G. Mohamed
Summary: Shoplifting detection is a significant challenge for shop owners and law enforcement agencies due to the increasing amount of video surveillance data. This study addresses the lack of a large benchmark dataset and proposes a method for shoplifting detection, outperforming baseline methods with 81% accuracy. The developed dataset will contribute to various areas of human activity recognition and improve systems for detecting robbery, identifying human movements, enhancing safety measures, and detecting instances of theft.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Sohaib Manzoor, Muhammad Akbar Kayani, Nouman Ali, Naeem Iqbal Ratyal, Heba G. Mohamed
Summary: With the increase in smart devices, the challenges of indoor traffic management have risen. Wi-Fi remains dominant in indoor scenarios due to its low cost and easy deployment, but the IEEE 802.11 standard lacks load fairness in user-AP associations. This paper introduces TiWA, a combined SDN-based solution that addresses this issue by considering multiple metrics for better association decisions, resulting in superior load fairness and throughput.
Article
Computer Science, Information Systems
Fahd N. Al-Wesabi, Fadwa Alrowais, Heba G. Mohamed, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel
Summary: Text information is important in enhancing the reliability and security of text data exchanged through the internet. Text watermarking, which involves embedding imperceptible text messages within the content, is a potential method for achieving content authentication and tampering detection.
Article
Computer Science, Information Systems
Saira Asghar, Ghulam Gilanie, Mubbashar Saddique, Hafeez Ullah, Heba G. Mohamed, Irshad Ahmed Abbasi, Mohamed Abbas
Summary: The classification of water sources is a challenging task due to low contrast texture features, visual similarities, and different camera angles. Various image enhancement techniques were used to enhance the contrast and texture features of water images. The proposed Convolutional Neural Network (CNN)-based model named WaterNet (WNet) achieved a classification accuracy of 97% using Contrast Limited Adaptive Histogram Equalization (CLAHE) for image enhancement.
Article
Computer Science, Information Systems
Shahid Akbar, Heba G. Mohamed, Hashim Ali, Aamir Saeed, Aftab Ahmed Khan, Sarah Gul, Ashfaq Ahmad, Farman Ali, Yazeed Yasin Ghadi, Muhammad Assam
Summary: In this study, an automatic and computationally effective model for identifying neuropeptides was proposed. The model utilized bigram position-specific scoring matrix (Bi-PSSM) and K-spaced bigram (KSB) to represent evolutionary information, and employed discrete wavelet transform (DWT) for noise reduction. Optimal features were selected from extracted features using Shapley Additive exPlanations (SHAP), and trained via six classification models. The ensemble classification approach achieved a higher predictive accuracy of 94.47% on training sequences and 92.55% on independent sequences, which outperformed existing methods by 3%.
Article
Computer Science, Information Systems
Afrah Naeem, Zeeshan Aslam, Tamara Al Shloul, Aqdas Naz, Muhammad Imran Nadeem, Mosleh Hmoud Al-Adhaileh, Yazeed Yasin Ghadi, Heba G. Mohamed
Summary: Due to the increase in illegal use of electricity, non-technical losses are rising in electricity distribution systems. The introduction of smart meters in the smart grid has led to new electricity theft attacks. Investigating abnormal electricity consumption patterns helps in detecting electricity thieves. Existing methods have poor accuracy in electricity theft detection (ETD) due to imbalanced datasets. We propose a novel sampling technique, named ROBC, to balance the dataset and a unique ETD model called DenseNet-GRU-LightGBM, which shows excellent results in ETD.
Article
Computer Science, Information Systems
Heba G. Mohamed, Fadwa Alrowais, Mohammed Abdullah Al-Hagery, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel
Summary: As the Internet of Things (IoT) continues to grow, a large amount of data is being generated. The sensitivity of IoT platforms to security challenges, such as data leakage and accidents caused by sensor data, is a concern. This article introduces a new intrusion detection algorithm, BSAWNN-ID, which uses the Bird Swarm Algorithm with Wavelet Neural Network to detect and classify intrusions in IoT platforms. The algorithm achieves better performance through feature subset selection and optimization of the WNN model.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)