Noha Ramadan | Menoufiya University (original) (raw)
Papers by Noha Ramadan
Biometrics and Bioinformatics, 2014
Nowadays, the security of image transmission over wireless channels have been of major interest f... more Nowadays, the security of image transmission over wireless channels have been of major interest for several researchers. However , most of the image encryption schemes do not consider the effect of bit errors occurring during wireless transmission. These errors are due to the transmission factors that affect the information such as noise and multipath fading. These factors are considered as a problem that should be handled by an efficient coding scheme. In this paper, low-density parity-check (LDPC) coding technique is used with the Data Encryption Standard (DES) algorithm for efficient image communication. The DES in Cipher-Block Chaining (CBC) mode is utilized to improve data security. Furthermore, LDPC coding is utilized for error correction in order to solve the limitations of wireless channels. Simulation results show this combination of DES encryption with LDPC coding improves the reliability of the wireless channel.
In recent years, chaos-based image encryption has become an efficient way to encrypt images due t... more In recent years, chaos-based image encryption has become an efficient way to encrypt images due to its high security. In this paper, we improve the classical Quadratic chaotic map to enhance its chaotic properties and use it for image encryption. Compared with the classical Quadratic map, the proposed Quadratic map demonstrates better chaotic properties for encryption such as a much larger maximal Lyapunov exponent. The proposed image encryption scheme is based on two chaotic maps. The first map is the Chepyshev chaotic map, which is used for the permutation of the pixels of the image. The permuted image is subjected to the diffusion process using the improved Quadratic map in an efficient encryption algorithm which its key is related to the original image. The main advantages of the proposed scheme are the large key space and its resistance to various attacks. Simulation results show that the proposed scheme has a high security level with low computational complexity, which makes i...
The security and reliability of image transmission over wireless noisy channels are a big challen... more The security and reliability of image transmission over wireless noisy channels are a big challenge. Ciphering techniques achieve security, but don't consider the effect of errors occurring during wireless transmission. Error correction coding techniques must be used with ciphering to improve reliability and throughput. We propose a combined ciphering and coding scheme based on the modified chaotic Logistic map with Low Density Parity-check Coding (LDPC) as an error correction coding technique to overcome the limitations of wireless channels due to the factors that affect transmission such as noise and multipath propagation. The experimental results show that this combined scheme enhances the performance parameters such as Peak Signal-to-Noise Ratio (PSNR) and Bit Error Rate (BER)and achieves both security and reliability in image transmission through the wireless channel
Journal of Ambient Intelligence and Humanized Computing, 2021
The Visual Computer, 2021
Menoufia Journal of Electronic Engineering Research, 2019
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 2018
This paper presents a chaos-based cancelable biometric scheme for iris recognition. Instead of us... more This paper presents a chaos-based cancelable biometric scheme for iris recognition. Instead of using original iris features, a masked version of the features is generated through chaotic map encryption for increasing the iris recognition system privacy. The proposed framework for iris recognition includes iris localization, normalization, and feature extraction with Gabor filter. Finally, chaotic encryption is used for generating cancelable IrisCodes. A modification of the Logistic map is included to increase the key space, and hence, the privacy is enhanced. The encryption key depends on the input image. So, the resultant encrypted feature vector is sensitive to the key. Thus, the encrypted feature vector is robust as the key space is large. The proposed iris recognition framework excludes the effects of eyelids and eyelashes and masks the original Gabor features to increase the level of security. Matching is performed with a Hamming Distance (HD) metric. The proposed framework achieves promising recognition rates of 99.08% and an Equal Error Rate (EER) of 1.17%.
International Journal of Computer Applications, 2015
This paper presents a new implementation of a hybrid ciphering system of images in Fourier domain... more This paper presents a new implementation of a hybrid ciphering system of images in Fourier domain based on two chaotic maps. The first map is the Bakermap,which is used to scramble the image pixels in three modes of operation (CBC, CFB and OFB). The second map is the logistic map,whose secret key depends on the plain text. In the key generation step of the logistic map, the chaotic stream is generated with plain text and hence the relation between the key and the plain text is established. We use Fractional Fourier Transform (FrFT) before the encryption to achieve a large degree of randomization. We examine the proposed algorithm and compare the results with the RC6 algorithm. The performance and security analysis prove that this hybrid ciphering system is efficient, reliable, and can effectively resist different attacks.
Journal of Central South University, 2017
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain... more A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented. Fractional Fourier Transform (FRFT) is used before the encryption scheme to get a large degree of randomization. The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map. Modification of the Logistic map is developed to increase the space of the encryption key, and hence increase the security. The key of the encryption algorithm dependents on the plain image, and thus, the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks. The key space is large and hence the algorithm can effectively resist brute-force attacks. The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure, and it can effectively resist different attacks.
Applied Optics, 2021
This paper presents a new trend in biometric security systems, which is cancelable multi-biometri... more This paper presents a new trend in biometric security systems, which is cancelable multi-biometrics. In general, traditional biometric systems depend on a single biometric for identification. These traditional systems are subject to different types of attacks. In addition, a biometric signature may be lost in hacking scenarios; for example, in the case of intrusion, biometric signatures can be stolen forever. To reduce the risk of losing biometric signatures, the trend of cancelable biometrics has evolved by using either deformed or encrypted versions of biometrics for verification. In this paper, several biometric traits for the same person are treated to obtain a single cancelable template. First, optical scanning holography (OSH) is applied during the acquisition of each biometric. The resulting outputs are then compressed simultaneously to generate a unified template based on the energy compaction property of the discrete cosine transform (DCT). Hence, the OSH is used in the pro...
Biometrics and Bioinformatics, 2014
Nowadays, the security of image transmission over wireless channels have been of major interest f... more Nowadays, the security of image transmission over wireless channels have been of major interest for several researchers. However , most of the image encryption schemes do not consider the effect of bit errors occurring during wireless transmission. These errors are due to the transmission factors that affect the information such as noise and multipath fading. These factors are considered as a problem that should be handled by an efficient coding scheme. In this paper, low-density parity-check (LDPC) coding technique is used with the Data Encryption Standard (DES) algorithm for efficient image communication. The DES in Cipher-Block Chaining (CBC) mode is utilized to improve data security. Furthermore, LDPC coding is utilized for error correction in order to solve the limitations of wireless channels. Simulation results show this combination of DES encryption with LDPC coding improves the reliability of the wireless channel.
In recent years, chaos-based image encryption has become an efficient way to encrypt images due t... more In recent years, chaos-based image encryption has become an efficient way to encrypt images due to its high security. In this paper, we improve the classical Quadratic chaotic map to enhance its chaotic properties and use it for image encryption. Compared with the classical Quadratic map, the proposed Quadratic map demonstrates better chaotic properties for encryption such as a much larger maximal Lyapunov exponent. The proposed image encryption scheme is based on two chaotic maps. The first map is the Chepyshev chaotic map, which is used for the permutation of the pixels of the image. The permuted image is subjected to the diffusion process using the improved Quadratic map in an efficient encryption algorithm which its key is related to the original image. The main advantages of the proposed scheme are the large key space and its resistance to various attacks. Simulation results show that the proposed scheme has a high security level with low computational complexity, which makes i...
The security and reliability of image transmission over wireless noisy channels are a big challen... more The security and reliability of image transmission over wireless noisy channels are a big challenge. Ciphering techniques achieve security, but don't consider the effect of errors occurring during wireless transmission. Error correction coding techniques must be used with ciphering to improve reliability and throughput. We propose a combined ciphering and coding scheme based on the modified chaotic Logistic map with Low Density Parity-check Coding (LDPC) as an error correction coding technique to overcome the limitations of wireless channels due to the factors that affect transmission such as noise and multipath propagation. The experimental results show that this combined scheme enhances the performance parameters such as Peak Signal-to-Noise Ratio (PSNR) and Bit Error Rate (BER)and achieves both security and reliability in image transmission through the wireless channel
Journal of Ambient Intelligence and Humanized Computing, 2021
The Visual Computer, 2021
Menoufia Journal of Electronic Engineering Research, 2019
Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 2018
This paper presents a chaos-based cancelable biometric scheme for iris recognition. Instead of us... more This paper presents a chaos-based cancelable biometric scheme for iris recognition. Instead of using original iris features, a masked version of the features is generated through chaotic map encryption for increasing the iris recognition system privacy. The proposed framework for iris recognition includes iris localization, normalization, and feature extraction with Gabor filter. Finally, chaotic encryption is used for generating cancelable IrisCodes. A modification of the Logistic map is included to increase the key space, and hence, the privacy is enhanced. The encryption key depends on the input image. So, the resultant encrypted feature vector is sensitive to the key. Thus, the encrypted feature vector is robust as the key space is large. The proposed iris recognition framework excludes the effects of eyelids and eyelashes and masks the original Gabor features to increase the level of security. Matching is performed with a Hamming Distance (HD) metric. The proposed framework achieves promising recognition rates of 99.08% and an Equal Error Rate (EER) of 1.17%.
International Journal of Computer Applications, 2015
This paper presents a new implementation of a hybrid ciphering system of images in Fourier domain... more This paper presents a new implementation of a hybrid ciphering system of images in Fourier domain based on two chaotic maps. The first map is the Bakermap,which is used to scramble the image pixels in three modes of operation (CBC, CFB and OFB). The second map is the logistic map,whose secret key depends on the plain text. In the key generation step of the logistic map, the chaotic stream is generated with plain text and hence the relation between the key and the plain text is established. We use Fractional Fourier Transform (FrFT) before the encryption to achieve a large degree of randomization. We examine the proposed algorithm and compare the results with the RC6 algorithm. The performance and security analysis prove that this hybrid ciphering system is efficient, reliable, and can effectively resist different attacks.
Journal of Central South University, 2017
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain... more A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented. Fractional Fourier Transform (FRFT) is used before the encryption scheme to get a large degree of randomization. The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map. Modification of the Logistic map is developed to increase the space of the encryption key, and hence increase the security. The key of the encryption algorithm dependents on the plain image, and thus, the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks. The key space is large and hence the algorithm can effectively resist brute-force attacks. The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure, and it can effectively resist different attacks.
Applied Optics, 2021
This paper presents a new trend in biometric security systems, which is cancelable multi-biometri... more This paper presents a new trend in biometric security systems, which is cancelable multi-biometrics. In general, traditional biometric systems depend on a single biometric for identification. These traditional systems are subject to different types of attacks. In addition, a biometric signature may be lost in hacking scenarios; for example, in the case of intrusion, biometric signatures can be stolen forever. To reduce the risk of losing biometric signatures, the trend of cancelable biometrics has evolved by using either deformed or encrypted versions of biometrics for verification. In this paper, several biometric traits for the same person are treated to obtain a single cancelable template. First, optical scanning holography (OSH) is applied during the acquisition of each biometric. The resulting outputs are then compressed simultaneously to generate a unified template based on the energy compaction property of the discrete cosine transform (DCT). Hence, the OSH is used in the pro...