This page has only limited features, please log in for full access.

Unclaimed
Osama S. Faragallah
Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Article
Published: 16 July 2021 in Journal of Computational Electronics
Reads 0
Downloads 0

A comparative study of different highly efficient broadband solar absorbers based on gold resonators is presented. We compare the absorption parameters for cylindrical, hollow cylindrical, pyramid, and sawtooth-shaped gold resonator structures over a wide input incident range at solar frequencies from 100 to 1200 THz (250 to 3000 nm). The performance of the structures is quantified in terms of the absorption, reflectance, and transmittance. We also numerically calculate the behavior of the structures when varying geometric parameters including the overall dimensions, the substrate size, and the resonator thickness. The proposed absorber structures can trap > 98% of the input incident light over a wide range of the terahertz (THz) spectrum. The performance of the absorber structures is compared based on their response to AM1.5 spectral irradiance to confirm their wide absorption behavior across the solar range. The proposed absorber structures offer higher absorption efficiency over a wide range of the solar spectrum. The effect of the height and other physical dimensions on the absorption is also presented. These results will help to choose the operating band for wide-angle and short-angle applications. This article also provides suggestions for the design of selective band absorption by changing the dimensions of such structures. The proposed absorber structures could be applied to design highly efficient solar cells with stable wide-angle behavior across input incident waves.

ACS Style

Vishal Sorathiya; Sunil Lavadiya; Ahmed AlGhamdi; Osama S. Faragallah; Hala S. El-Sayed; Mahmoud M. A. Eid; Ahmed Nabih Zaki Rashed. A comparative study of broadband solar absorbers with different gold metasurfaces and MgF2 on tungsten substrates. Journal of Computational Electronics 2021, 1 -11.

AMA Style

Vishal Sorathiya, Sunil Lavadiya, Ahmed AlGhamdi, Osama S. Faragallah, Hala S. El-Sayed, Mahmoud M. A. Eid, Ahmed Nabih Zaki Rashed. A comparative study of broadband solar absorbers with different gold metasurfaces and MgF2 on tungsten substrates. Journal of Computational Electronics. 2021; ():1-11.

Chicago/Turabian Style

Vishal Sorathiya; Sunil Lavadiya; Ahmed AlGhamdi; Osama S. Faragallah; Hala S. El-Sayed; Mahmoud M. A. Eid; Ahmed Nabih Zaki Rashed. 2021. "A comparative study of broadband solar absorbers with different gold metasurfaces and MgF2 on tungsten substrates." Journal of Computational Electronics , no. : 1-11.

Journal article
Published: 28 June 2021 in IEEE Access
Reads 0
Downloads 0

In order to obtain beamforming gains and prevent high pathloss in millimeter wave (mmWave) systems, large number of antennas is employed. Digital precoders are difficult to implement with many antennas because of hardware constraints, while analog precoders have limited performance. In this paper, hybrid precoding based on a deep learning framework, HybridPrecodingNet, is proposed, which uses large-scale information to predict the parameters of hybrid precoders and decoders. The statistics of the channel covariance matrix are applied to design the hybrid precoders and decoders. The proposed HybridPrecodingNet at the receiver is applied for the channel estimation and design of hybrid decoders. In our proposed framework, the structure of HybridPrecodingNet is trained to learn how to optimize the hybrid precoder and decoder for maximum spectral efficiency. Comparison between different precoding techniques is provided. Results show that HybridPrecodingNet approaches the sub-optimal solution and gives significant spectral efficiency enhancement.

ACS Style

Osama S. Faragallah; Hala S. El-Sayed; Mohamed G. El-Mashed. Performance Enhancement of MmWave MIMO Systems Using Deep Learning Framework. IEEE Access 2021, 9, 1 -1.

AMA Style

Osama S. Faragallah, Hala S. El-Sayed, Mohamed G. El-Mashed. Performance Enhancement of MmWave MIMO Systems Using Deep Learning Framework. IEEE Access. 2021; 9 ():1-1.

Chicago/Turabian Style

Osama S. Faragallah; Hala S. El-Sayed; Mohamed G. El-Mashed. 2021. "Performance Enhancement of MmWave MIMO Systems Using Deep Learning Framework." IEEE Access 9, no. : 1-1.

Regular paper
Published: 22 June 2021 in Optical Review
Reads 0
Downloads 0

In this study, a simple hollow core hexagonal structured photonic crystal fiber is offered and analyzed to discern commonly used different type of alcohols in our daily life. The proposed sensor guiding properties are numerically investigated using a full vectorial finite element software-based scheme. To ensure higher accuracy, the properties of alcohols (refractive index and dielectric constant) at different wavelength are used to calculate the behaviour of the sensor. The simulation results ensure that extremely high relative sensitivity around 89% can be achieved from the sensor at optimum structural condition. In addition, other important propagation parameters such as confinement loss (CL), single-mode propagation spot size, numerical aperture, etc., are discussed in detail for various geometric conditions. The structure of that sensor is straightforward, and available commercial fabrication technology can be used to fabricate it without any complexity.

ACS Style

Ahasan Habib; Shamim Anower; Ahmed AlGhamdi; Osama S. Faragallah; Mahmoud M. A. Eid; Ahmed Nabih Zaki Rashed. Efficient way for detection of alcohols using hollow core photonic crystal fiber sensor. Optical Review 2021, 1 -10.

AMA Style

Ahasan Habib, Shamim Anower, Ahmed AlGhamdi, Osama S. Faragallah, Mahmoud M. A. Eid, Ahmed Nabih Zaki Rashed. Efficient way for detection of alcohols using hollow core photonic crystal fiber sensor. Optical Review. 2021; ():1-10.

Chicago/Turabian Style

Ahasan Habib; Shamim Anower; Ahmed AlGhamdi; Osama S. Faragallah; Mahmoud M. A. Eid; Ahmed Nabih Zaki Rashed. 2021. "Efficient way for detection of alcohols using hollow core photonic crystal fiber sensor." Optical Review , no. : 1-10.

Article
Published: 12 June 2021 in Optical and Quantum Electronics
Reads 0
Downloads 0

This paper presents two optical double image encryption systems using the Fresnel Transform (FrT) and chaotic maps (CM) such as the baker map (BM) and the Arnold’s Cat map (ACM). The two proposed optical double CM-based FrT image encryption systems are BM-FrT based optical double image encryption and ACM-FrT based optical double image encryption. In the two proposed optical double CM-based FrT image encryption systems, the image is firstly scrambled using the BM or the ACM then, modulated with the first random phase mask, and optically transformed using the FrT. The FrT scrambled image is then again scrambled using the BM or the ACM then, modulated with the second random phase mask and optically transformed with the FrT to get the encrypted image. The usage of a chaotic map as a pre-processing scrambling stage along with the FrT gives the two proposed optical encryption systems the advantages of both the noise immunity from the chaotic map and the security encryption from the FrT. Also, the optical FrT geometric parameters are utilized as additional extra keys that improve the security of the two proposed optical double CM-based FrT image encryption systems. The two proposed optical double CM-based FrT image encryption systems are extensively tested and compared with other encryption systems. The outcomes demonstrated that the proposed BM-FrT based optical double image encryption and ACM-FrT based optical double image encryption enhance the entropy over BM and ACM by a range from 2.02 to 128.23% and 2.06 to 128.16%. The results show that the two proposed optical double CM-based FrT image encryption systems are time-efficient and provide a high level of information security without affecting its noise immunity.

ACS Style

Osama S. Faragallah; Ashraf Afifi; Ibrahim F. Elashry; Ensherah A. Naeem; Heba M. El-Hoseny; Hala S. El-Sayed; Alaa M. Abbas. Efficient optical double image cryptosystem using chaotic mapping-based Fresnel transform. Optical and Quantum Electronics 2021, 53, 1 -26.

AMA Style

Osama S. Faragallah, Ashraf Afifi, Ibrahim F. Elashry, Ensherah A. Naeem, Heba M. El-Hoseny, Hala S. El-Sayed, Alaa M. Abbas. Efficient optical double image cryptosystem using chaotic mapping-based Fresnel transform. Optical and Quantum Electronics. 2021; 53 (6):1-26.

Chicago/Turabian Style

Osama S. Faragallah; Ashraf Afifi; Ibrahim F. Elashry; Ensherah A. Naeem; Heba M. El-Hoseny; Hala S. El-Sayed; Alaa M. Abbas. 2021. "Efficient optical double image cryptosystem using chaotic mapping-based Fresnel transform." Optical and Quantum Electronics 53, no. 6: 1-26.

Journal article
Published: 14 April 2021 in Sensors
Reads 0
Downloads 0

Long-range radio (LoRa) communication is a widespread communication protocol that offers long range transmission and low data rates with minimum power consumption. In the context of solid waste management, only a low amount of data needs to be sent to the remote server. With this advantage, we proposed architecture for designing and developing a customized sensor node and gateway based on LoRa technology for realizing the filling level of the bins with minimal energy consumption. We evaluated the energy consumption of the proposed architecture by simulating it on the Framework for LoRa (FLoRa) simulation by varying distinct fundamental parameters of LoRa communication. This paper also provides the distinct evaluation metrics of the the long-range data rate, time on-air (ToA), LoRa sensitivity, link budget, and battery life of sensor node. Finally, the paper concludes with a real-time experimental setup, where we can receive the sensor data on the cloud server with a customized sensor node and gateway.

ACS Style

Shaik Akram; Rajesh Singh; Mohammed AlZain; Anita Gehlot; Mamoon Rashid; Osama Faragallah; Walid El-Shafai; Deepak Prashar. Performance Analysis of IoT and Long-Range Radio-Based Sensor Node and Gateway Architecture for Solid Waste Management. Sensors 2021, 21, 2774 .

AMA Style

Shaik Akram, Rajesh Singh, Mohammed AlZain, Anita Gehlot, Mamoon Rashid, Osama Faragallah, Walid El-Shafai, Deepak Prashar. Performance Analysis of IoT and Long-Range Radio-Based Sensor Node and Gateway Architecture for Solid Waste Management. Sensors. 2021; 21 (8):2774.

Chicago/Turabian Style

Shaik Akram; Rajesh Singh; Mohammed AlZain; Anita Gehlot; Mamoon Rashid; Osama Faragallah; Walid El-Shafai; Deepak Prashar. 2021. "Performance Analysis of IoT and Long-Range Radio-Based Sensor Node and Gateway Architecture for Solid Waste Management." Sensors 21, no. 8: 2774.

Journal article
Published: 02 April 2021 in Biosensors
Reads 0
Downloads 0

A plasmonic material-coated circular-shaped photonic crystal fiber (C-PCF) sensor based on surface plasmon resonance (SPR) is proposed to explore the optical guiding performance of the refractive index (RI) sensing at 1.7–3.7 μm. A twin resonance coupling profile is observed by selectively infiltrating liquid using finite element method (FEM). A nano-ring gold layer with a magnesium fluoride (MgF2) coating and fused silica are used as plasmonic and base material, respectively, that help to achieve maximum sensing performance. RI analytes are highly sensitive to SPR and are injected into the outmost air holes of the cladding. The highest sensitivity of 27,958.49 nm/RIU, birefringence of 3.9 × 104, resolution of 3.70094 × 105 RIU, and transmittance dip of −34 dB are achieved. The proposed work is a purely numerical simulation with proper optimization. The value of optimization has been referred to with an experimental tolerance value, but at the same time it has been ensured that it is not fabricated and tested. In summary, the explored C-PCF can widely be eligible for RI-based sensing applications for its excellent performance, which makes it a solid candidate for next generation biosensing applications.

ACS Style

Kawsar Ahmed; Mohammed AlZain; Hasan Abdullah; Yanhua Luo; Dhasarathan Vigneswaran; Osama Faragallah; Mahmoud Eid; Ahmed Rashed. Highly Sensitive Twin Resonance Coupling Refractive Index Sensor Based on Gold- and MgF2-Coated Nano Metal Films. Biosensors 2021, 11, 104 .

AMA Style

Kawsar Ahmed, Mohammed AlZain, Hasan Abdullah, Yanhua Luo, Dhasarathan Vigneswaran, Osama Faragallah, Mahmoud Eid, Ahmed Rashed. Highly Sensitive Twin Resonance Coupling Refractive Index Sensor Based on Gold- and MgF2-Coated Nano Metal Films. Biosensors. 2021; 11 (4):104.

Chicago/Turabian Style

Kawsar Ahmed; Mohammed AlZain; Hasan Abdullah; Yanhua Luo; Dhasarathan Vigneswaran; Osama Faragallah; Mahmoud Eid; Ahmed Rashed. 2021. "Highly Sensitive Twin Resonance Coupling Refractive Index Sensor Based on Gold- and MgF2-Coated Nano Metal Films." Biosensors 11, no. 4: 104.

Original research
Published: 12 February 2021 in Journal of Ambient Intelligence and Humanized Computing
Reads 0
Downloads 0

Recently, the digital multimedia cybersecurity has become a research topic of interest due to the fast development of real-time multimedia applications over public networks such as the Internet. Therefore, this research paper introduces an efficient cybersecurity framework for protecting the high-efficiency video coding (HEVC) frames. The suggested selective cybersecurity HEVC framework employs a robust hybrid technique based on watermarking and selective encryption for maintaining confidentiality and achieving copyright protection of the transmitted HEVC information. The watermarking method employs the Homomorphic transform and singular value decomposition in the discrete wavelet transform to increase the immunity of watermarked HEVC streams to attacks. Moreover, the selective encryption technique uses the Chaotic logistic map for encrypting the motion vector difference and the discrete cosine transform sign bits to provide the feature of HEVC format compliance with low encryption overhead cost. An extensive security investigation is carried out for the proposed selective HEVC cybersecurity framework. The obtained experimental outcomes ensure and validate the effectiveness of the selective HEVC cybersecurity framework for HEVC sequences transmission.

ACS Style

Osama S. Faragallah; Walid El-Shafai; Ahmed I. Sallam; Ibrahim Elashry; El-Sayed M. El-Rabaie; Ashraf Afifi; Mohammed A. AlZain; Jehad F. Al-Amri; Fathi E. Abd El-Samie; Hala S. El-Sayed. Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. Journal of Ambient Intelligence and Humanized Computing 2021, 1 -25.

AMA Style

Osama S. Faragallah, Walid El-Shafai, Ahmed I. Sallam, Ibrahim Elashry, El-Sayed M. El-Rabaie, Ashraf Afifi, Mohammed A. AlZain, Jehad F. Al-Amri, Fathi E. Abd El-Samie, Hala S. El-Sayed. Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. Journal of Ambient Intelligence and Humanized Computing. 2021; ():1-25.

Chicago/Turabian Style

Osama S. Faragallah; Walid El-Shafai; Ahmed I. Sallam; Ibrahim Elashry; El-Sayed M. El-Rabaie; Ashraf Afifi; Mohammed A. AlZain; Jehad F. Al-Amri; Fathi E. Abd El-Samie; Hala S. El-Sayed. 2021. "Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication." Journal of Ambient Intelligence and Humanized Computing , no. : 1-25.

Journal article
Published: 29 January 2021 in IEEE Access
Reads 0
Downloads 0

This research paper proposes a secure opto-audio cryptosystem using XORing mask and Hartley transform (HT). The digital one dimensional (1D) plainaudio data is converted into two dimensional plainaudio map (2D PAM) and after that, the 2D PAM is divided into 2D plainaudio blocks (2D PABs). The basic idea of the proposed opto-audio encryption system depends on XORing each block of the 2D PABs with a single image selected from a personal image database that can be viewed as a secret key in the proposed opto-audio cryptosystem. Each block of the mixed 2D PABs is then transposed using the chaotic logistic adjusted sine map (LASM) and optically encrypted with HT. The XOR and LASM are implemented digitally while HT implemented optically. An additional XORing mask step helps to remove residual intelligibility from the 2D PABs, fill in speechless gaps in spoken conversations, and destroy both the pitch and format details. The utilization of chaotic LASM allows efficient noise immunity. A comparative study is held between the proposed opto-audio encryption system and other related audio encryption systems in terms the standard well known encryption metrics. The results have confirmed the efficiency of the introduced opto-audio encryption system. The proposed opto-audio encryption system security is explored from an accurate encryption point of view, and tests confirmed the superiority of the proposed opto-audio encryption system from the encryption point of view.

ACS Style

Osama S. Faragallah; Hala S. El-Sayed. Secure Opto-Audio Cryptosystem Using XORing Mask and Hartley Transform. IEEE Access 2021, 9, 1 -1.

AMA Style

Osama S. Faragallah, Hala S. El-Sayed. Secure Opto-Audio Cryptosystem Using XORing Mask and Hartley Transform. IEEE Access. 2021; 9 ():1-1.

Chicago/Turabian Style

Osama S. Faragallah; Hala S. El-Sayed. 2021. "Secure Opto-Audio Cryptosystem Using XORing Mask and Hartley Transform." IEEE Access 9, no. : 1-1.

Article
Published: 28 January 2021 in Wireless Personal Communications
Reads 0
Downloads 0

The paper presents an efficient image cryptosystem for dealing with low details gray scale images. The proposed image cryptosystem is based on using the RC6 encryption algorithm with various operation modes like ECB, CBC, OFB and CFB. The gray scale images is firstly divided into blocks of 128-bit. Then, the RC6 cipher algorithm is applied on 128-bit blocks in different modes of operation. The proposed strategy is inspected with different encryption key performance indicators like entropy, correlation coefficients, irregular deviation, histogram deviation, differential and noise immunity tests. Experimental tests ensure the superiority of the proposed encryption strategy for the encryption of small details images especially with OFB modes of operation. The achieved outcomes ensure the efficiency of the proposed encryption strategy in encrypting small details gray scale images.

ACS Style

Osama S. Faragallah; Hala S. El-Sayed; Ashraf Afifi; S. F. El-Zoghdy. Small Details Gray Scale Image Encryption Using RC6 Block Cipher. Wireless Personal Communications 2021, 118, 1559 -1589.

AMA Style

Osama S. Faragallah, Hala S. El-Sayed, Ashraf Afifi, S. F. El-Zoghdy. Small Details Gray Scale Image Encryption Using RC6 Block Cipher. Wireless Personal Communications. 2021; 118 (2):1559-1589.

Chicago/Turabian Style

Osama S. Faragallah; Hala S. El-Sayed; Ashraf Afifi; S. F. El-Zoghdy. 2021. "Small Details Gray Scale Image Encryption Using RC6 Block Cipher." Wireless Personal Communications 118, no. 2: 1559-1589.

Journal article
Published: 30 December 2020 in IEEE Access
Reads 0
Downloads 0

The track of medical imaging has witnessed several advancements in the last years. Several medical imaging modalities have appeared in the last decades including X-ray, Computed Tomography (CT), Magnetic Resonance (MR), Positron Emission Tomography (PET), Single-Photon Emission Computed Tomography (SPECT) and ultrasound imaging. Generally, medical images are used for the diagnosis purpose. Each type of acquired images has some merits and limitations. To maximize medical images utilization for the purpose of diagnosis, medical imaging fusion trend has appeared as a hot research field. Different medical imaging modalities are fused to obtain new images with complementary information. This paper presents a survey study of medical imaging modalities and their characteristics. In addition, different medical image fusion approaches and their appropriate quality metrics are presented. The main aim of this comprehensive survey analysis is to contribute in the advancement of medical image approaches that can help for better diagnosis of different diseases.

ACS Style

Osama S. Faragallah; Heba El-Hoseny; Walid El-Shafai; Wael Abd El-Rahman; Hala S. El-Sayed; El-Sayed M. El-Rabaie; Fathi E. Abd El-Samie; Gamal G. N. Geweid. A Comprehensive Survey Analysis for Present Solutions of Medical Image Fusion and Future Directions. IEEE Access 2020, 9, 11358 -11371.

AMA Style

Osama S. Faragallah, Heba El-Hoseny, Walid El-Shafai, Wael Abd El-Rahman, Hala S. El-Sayed, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Gamal G. N. Geweid. A Comprehensive Survey Analysis for Present Solutions of Medical Image Fusion and Future Directions. IEEE Access. 2020; 9 ():11358-11371.

Chicago/Turabian Style

Osama S. Faragallah; Heba El-Hoseny; Walid El-Shafai; Wael Abd El-Rahman; Hala S. El-Sayed; El-Sayed M. El-Rabaie; Fathi E. Abd El-Samie; Gamal G. N. Geweid. 2020. "A Comprehensive Survey Analysis for Present Solutions of Medical Image Fusion and Future Directions." IEEE Access 9, no. : 11358-11371.

Journal article
Published: 15 December 2020 in IEEE Access
Reads 0
Downloads 0

Millimeter wave (mmWave) system is a key technology for the fifth generation (5G). Precoding techniques can be applied in the radio frequency (RF) stage to achieve spatial multiplexing gain. Studying the problems of hardware imperfections in the RF stage for mmWave communication system is very important because it can affect the transmitted signals and overall system performance. In this paper, mmWave MIMO system under phase noise problem is proposed. In addition, an optimization problem for the design of hybrid precoder under phase noise is formulated. An alternating minimization algorithm using manifold optimization is proposed to close the performance of the fully digital precoder. A realistic power consumption model is considered. To estimate the mmWave channel parameters and to track the phase noise parameters, a Bayesian Cramér-Rao lower bounds (BCRLBs), Kalman filter, least square (LS) and maximum a posterior (MAP) algorithms are proposed. Furthermore, the proposed system with ideal hardware mmWave system is compared with non-ideal system under amplified thermal noise and residual additive transceiver hardware impairments. Spectral efficiencies (SEs) of the proposed system are provided with different scenarios. The analytical and simulation tests show that the influence of phase noise problem may decrease SE performance, especially at higher phase noise.

ACS Style

Osama S. Faragallah; Hala S. El-Sayed; Mohamed G. El-Mashed. Estimation and Tracking for Millimeter Wave MIMO Systems Under Phase Noise Problem. IEEE Access 2020, 8, 228009 -228023.

AMA Style

Osama S. Faragallah, Hala S. El-Sayed, Mohamed G. El-Mashed. Estimation and Tracking for Millimeter Wave MIMO Systems Under Phase Noise Problem. IEEE Access. 2020; 8 (99):228009-228023.

Chicago/Turabian Style

Osama S. Faragallah; Hala S. El-Sayed; Mohamed G. El-Mashed. 2020. "Estimation and Tracking for Millimeter Wave MIMO Systems Under Phase Noise Problem." IEEE Access 8, no. 99: 228009-228023.

Journal article
Published: 27 August 2020 in IEEE Access
Reads 0
Downloads 0

Multimedia cybersecurity is a prevalent research topic in the digital world due to the rapid progress of digital multimedia and Internet applications. Watermarking, encryption, and steganography schemes are employed to attain multimedia data confidentiality and robustness. However, these schemes are externally applied on trusted computers, and there has been a lack of similar schemes that can be effectively and efficiently embedded through an untrusted transmission medium. In this work, a self-embedding-based High-Efficiency Video Coding (HEVC) transmission and integrity verification framework is presented. This framework is robust and reliable for verifying the integrity of HEVC frames transmitted through insecure communication channels. Firstly, the transmitted HEVC frames are divided into a number of blocks with a certain block size. After that, a discrete transform is used for self-embedding of watermarks from each block into another block depending on a predefined mechanism. The Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Discrete Fourier Transforms (DFT) are tested for this task. The watermarked HEVC frames are transmitted through a wireless communication channel, and hence they become subject to different attacks and corruptions. At the receiver side, the secret watermarks in each block are sensed with a correlation-based method to discover dubious counterfeit operations. To verify the reliability of the suggested transmission framework for achieving high protection and robust content verification of the transmitted HEVC frames over insecure communication channels, different HEVC analyses and comparisons are performed. Simulation results demonstrate the suitability of the suggested transmission framework for different multimedia cybersecurity applications. Furthermore, the comparative analysis shows that the DFT is an efficient discrete transform that can be employed with the proposed transmission framework to guarantee a higher HEVC frame integrity. It has a higher sensitivity to simple modifications in the transmitted watermarked HEVC frames. This makes the suggested cybersecurity framework applicable, secure, and appropriate for multimedia integrity and verification purposes.

ACS Style

Osama S. Faragallah; Ashraf Afifi; Hala S. El-Sayed; Mohammed A. Alzain; Jehad F. Al-Amri; Fathi E. Abd El-Samie; Walid El-Shafai. Efficient HEVC Integrity Verification Scheme for Multimedia Cybersecurity Applications. IEEE Access 2020, 8, 167069 -167089.

AMA Style

Osama S. Faragallah, Ashraf Afifi, Hala S. El-Sayed, Mohammed A. Alzain, Jehad F. Al-Amri, Fathi E. Abd El-Samie, Walid El-Shafai. Efficient HEVC Integrity Verification Scheme for Multimedia Cybersecurity Applications. IEEE Access. 2020; 8 (99):167069-167089.

Chicago/Turabian Style

Osama S. Faragallah; Ashraf Afifi; Hala S. El-Sayed; Mohammed A. Alzain; Jehad F. Al-Amri; Fathi E. Abd El-Samie; Walid El-Shafai. 2020. "Efficient HEVC Integrity Verification Scheme for Multimedia Cybersecurity Applications." IEEE Access 8, no. 99: 167069-167089.

Journal article
Published: 21 August 2020 in IEEE Access
Reads 0
Downloads 0

Powerful cryptographic systems based on mathematically hard problems are utilized to ensure tighter security for data communication purposes. However, these traditional cryptographic systems are bound to fail in the ensuing era of quantum computing. Thus, Artificial Intelligence (AI) inspired security methods are needed to secure communications in the era of quantum computing. This paper presents a challenge-response password-based authentication system based on the Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) AI hard problem. In this system, a server sends a challenge text to a client, then the client generates a random image and blends the challenge text inside this random image using his password. Then the client sends the generated image to the server. The server extracts the challenge text from the sent image using his copy of the client’s password. If the extracted challenge text is the same as the sent challenge text, then both the client’s and the server’s copies of the password match and the client is authenticated. The efficiency of the proposed system is analyzed and the outcomes prove that the proposed system is efficient in terms of time and space. Also, a security investigation of the proposed system is employed, and the results prove that the system is probabilistic and very sensitive to changes in its parameters. It does not leak any statistical information about the client’s password and the generated images cannot be distinguished from random images. In addition, the security of the proposed system is analyzed against two possible attacks; the brute force attack and the replay attack and the results prove that the proposed system is immune to these attacks. Finally, the proposed system is ensured to be indistinguishably secure against an adaptive chosen-challenge text attack (IND-ACCTA), based on the CAPTCHA AI hard problem when the hash function H is modeled as a random oracle.

ACS Style

Masoud Alajmi; Ibrahim Elashry; Hala S. El-Sayed; Osama S. Faragallah. A Password-Based Authentication System Based on the CAPTCHA AI Problem. IEEE Access 2020, 8, 153914 -153928.

AMA Style

Masoud Alajmi, Ibrahim Elashry, Hala S. El-Sayed, Osama S. Faragallah. A Password-Based Authentication System Based on the CAPTCHA AI Problem. IEEE Access. 2020; 8 (99):153914-153928.

Chicago/Turabian Style

Masoud Alajmi; Ibrahim Elashry; Hala S. El-Sayed; Osama S. Faragallah. 2020. "A Password-Based Authentication System Based on the CAPTCHA AI Problem." IEEE Access 8, no. 99: 153914-153928.

Journal article
Published: 14 May 2020 in IEEE Access
Reads 0
Downloads 0

Recently, massive research works have been accomplished for augmenting privacy and security requirements for cybersecurity applications in wireless communication networks. This is attributed to the fact that conventional security processes are not appropriate for robust, efficient, and reliable multimedia streaming over unsecure media. Therefore, this paper presents an efficient color image cryptosystem based on RC6 with different modes of operation. The proposed cryptosystem is composed of two phases: encryption and decryption. The encryption phase starts by decomposing the color plainimage with few details into its RGB components, which in turn are segmented into 128-bit blocks. These blocks are then enciphered with RC6 with an appropriate mode of operation. After that, the corresponding enciphered blocks of RGB components are multiplexed for constructing the final cipherimage. This scenario is reversed in the decryption phase. The performance of the proposed cryptosystem is gauged via simulation using a set of encryption quality metrics. The simulation results reveal that the proposed cryptosystem with cipher block chaining (CBC), cipher feedback (CFB), and output feedback (OFB) modes can efficiently and effectively hide all information of the color images with few details even in the presence of some input blocks with similar data. On the other hand, the results show that the electronic codebook (ECB) mode is not effective at all in hiding all details of images. Finally, the obtained results ensure the applicability of the proposed cryptosystem and its efficiency in encrypting images in terms of security, encryption quality, and noise immunity.

ACS Style

Osama S. Faragallah; Ashraf Afifi; Walid El-Shafai; Hala S. El-Sayed; Mohammed A. Alzain; Jehad F. Al-Amri; Fathi E. Abd El-Samie. Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications. IEEE Access 2020, 8, 103200 -103218.

AMA Style

Osama S. Faragallah, Ashraf Afifi, Walid El-Shafai, Hala S. El-Sayed, Mohammed A. Alzain, Jehad F. Al-Amri, Fathi E. Abd El-Samie. Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications. IEEE Access. 2020; 8 (99):103200-103218.

Chicago/Turabian Style

Osama S. Faragallah; Ashraf Afifi; Walid El-Shafai; Hala S. El-Sayed; Mohammed A. Alzain; Jehad F. Al-Amri; Fathi E. Abd El-Samie. 2020. "Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications." IEEE Access 8, no. 99: 103200-103218.

Article
Published: 22 April 2020 in Multimedia Tools and Applications
Reads 0
Downloads 0

This paper proposes a design of 2-D chaotic Baker map for image encryption which utilizes three modes of operations: 1) the cipher block chaining (CBC) mode, 2) the cipher feedback (CFB) mode, and 3) the output feedback (OFB) mode. The proposed image cryptosystem is characterized by a short encryption time of scalevariant images and a high level of confusion and diffusion due to its shuffling and substitution processes. This is useful in applications such as online streaming of paid videos, in which both the speed of encryption\decryption and a good encryption quality is required. A comparison between the proposed image cryptosystem, the traditional 2-D chaotic Baker map permutation cryptosystem, and the RC6 substitution cryptosystem is presented in the paper. A comparison is held with relevant techniques and the results reveal that the proposed image cryptosystem achieves a high degree of security. It is also more immune to noise than the RC6 cryptosystem and takes less processing time for images with large dimensions than both the chaotic cryptosystem and the RC6 cryptosystem. The superiority of the proposed cryptosystem has been proved for image encryption against the recent techniques from the cryptographic viewpoint.

ACS Style

Ibrahim F. Elashry; Walid El-Shafai; Emad S. Hasan; S. El-Rabaie; Alaa Abbas; Fathi E. Abd El-Samie; Hala S. El-Sayed; Osama S. Faragallah. Efficient chaotic-based image cryptosystem with different modes of operation. Multimedia Tools and Applications 2020, 79, 20665 -20687.

AMA Style

Ibrahim F. Elashry, Walid El-Shafai, Emad S. Hasan, S. El-Rabaie, Alaa Abbas, Fathi E. Abd El-Samie, Hala S. El-Sayed, Osama S. Faragallah. Efficient chaotic-based image cryptosystem with different modes of operation. Multimedia Tools and Applications. 2020; 79 (29-30):20665-20687.

Chicago/Turabian Style

Ibrahim F. Elashry; Walid El-Shafai; Emad S. Hasan; S. El-Rabaie; Alaa Abbas; Fathi E. Abd El-Samie; Hala S. El-Sayed; Osama S. Faragallah. 2020. "Efficient chaotic-based image cryptosystem with different modes of operation." Multimedia Tools and Applications 79, no. 29-30: 20665-20687.

Article
Published: 18 March 2020 in Multimedia Tools and Applications
Reads 0
Downloads 0

In this era of technology, digital images turn out to be ubiquitous in a contemporary society and they can be generated and manipulated by a wide variety of hardware and software technologies. Copy-move forgery is considered as an image tampering technique that aims to generate manipulated tampered images by concealing unwanted objects or reproducing desirable objects within the same image. Therefore, image content authentication has become an essential demand. In this paper, an innovative design for automatic detection of copy-move forgery based on deep learning approaches is proposed. A Convolutional Neural Network (CNN) is specifically designed for Copy-Move Forgery Detection (CMFD). The CNN is exploited to learn hierarchical feature representations from input images, which are used for detecting the tampered and original images. The extensive experiments demonstrate that the proposed deep CMFD algorithm outperforms the traditional CMFD systems by a considerable margin on the three publicly accessible datasets: MICC-F220, MICC-F2000, and MICC-F600. Furthermore, the three datasets are incorporated and joined to the SATs-130 dataset to form new combinations of datasets. An accuracy of 100% has been achieved for the four datasets. This proves the robustness of the proposed algorithm against a diversity of known attacks. For better evaluation, comparative results are included.

ACS Style

Mohamed A. Elaskily; Heba A. Elnemr; Ahmed Sedik; Mohamed M. Dessouky; Ghada M. El Banby; Osama A. Elshakankiry; Ashraf A. M. Khalaf; Heba K. Aslan; Osama S. Faragallah; Fathi E. Abd El-Samie. A novel deep learning framework for copy-moveforgery detection in images. Multimedia Tools and Applications 2020, 79, 19167 -19192.

AMA Style

Mohamed A. Elaskily, Heba A. Elnemr, Ahmed Sedik, Mohamed M. Dessouky, Ghada M. El Banby, Osama A. Elshakankiry, Ashraf A. M. Khalaf, Heba K. Aslan, Osama S. Faragallah, Fathi E. Abd El-Samie. A novel deep learning framework for copy-moveforgery detection in images. Multimedia Tools and Applications. 2020; 79 (27-28):19167-19192.

Chicago/Turabian Style

Mohamed A. Elaskily; Heba A. Elnemr; Ahmed Sedik; Mohamed M. Dessouky; Ghada M. El Banby; Osama A. Elshakankiry; Ashraf A. M. Khalaf; Heba K. Aslan; Osama S. Faragallah; Fathi E. Abd El-Samie. 2020. "A novel deep learning framework for copy-moveforgery detection in images." Multimedia Tools and Applications 79, no. 27-28: 19167-19192.

Journal article
Published: 17 February 2020 in IEEE Access
Reads 0
Downloads 0

The need for cybersecurity increases to protect the exchange of information for improving the data privacy. This paper presents an investigation of the encryption efficiency of the chaotic-based image block cipher in the spatial and Fractional Fourier Transform (FrFT) domains. The main objective of this investigation is to study the performance of different chaotic maps , while considering the parameters of the FrFT as additional keys for encryption and achieving reliable cybersecurity for robust image communication. In this paper, Cat, Baker, and Logistic maps confusion approaches are applied in the spatial and FrFT domains to study and analyze the cybersecurity and ciphering efficiency of chaos -based image cryptosystems. The confusion features of the chaotic maps in spatial and FrFT domain s are investigated using information entropy, differential analysis, histograms, visual inspection, attack analysis, effect of noise, and encryption quality analysis. Simulation results prove that the chaotic -based image encryption in the FrFT domain increases the efficiency of the confusion process and achieves a high nonlinear relation between the plainimage and the cipherimage in a symmetric ciphering approach. Moreover, the results demonstrate that the Cat -FrFT scheme is more susceptible to channel noise attacks than the Baker-FrFT and the Logistic-FrFT schemes. Hence, they can be implemented efficiently in the scenarios of noisy channels due to their high robustness to channel noise.

ACS Style

Osama S. Faragallah; Ashraf Afifi; Walid El-Shafai; Hala S. El-Sayed; Ensherah A. Naeem; Mohammed A. AlZain; Jehad F. Al-Amri; Ben Soh; Fathi E. Abd El-Samie. Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications. IEEE Access 2020, 8, 42491 -42503.

AMA Style

Osama S. Faragallah, Ashraf Afifi, Walid El-Shafai, Hala S. El-Sayed, Ensherah A. Naeem, Mohammed A. AlZain, Jehad F. Al-Amri, Ben Soh, Fathi E. Abd El-Samie. Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications. IEEE Access. 2020; 8 (99):42491-42503.

Chicago/Turabian Style

Osama S. Faragallah; Ashraf Afifi; Walid El-Shafai; Hala S. El-Sayed; Ensherah A. Naeem; Mohammed A. AlZain; Jehad F. Al-Amri; Ben Soh; Fathi E. Abd El-Samie. 2020. "Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications." IEEE Access 8, no. 99: 42491-42503.

Article
Published: 07 February 2020 in Wireless Personal Communications
Reads 0
Downloads 0

Nowadays, wireless communications play a vital role in all aspects in our daily life activities. A major part of such communications is audio and its rate increases dramatically. Securing audio during such communications is very important issue. Though OFDM is characterized by its strength against various broadcast impairments, the distinct time and frequency features makes signal of traditional OFDM vulnerable to malicious eavesdropping and intrusion. This paper proposes a communication model for encrypting and transmitting audio over OFDM systems. The 2D Baker, Logistic and Standard chaotic encryption schemes are utilized in the suggested model to encrypt and decrypt the transmitted audio. A simulation model for the proposed communication system is built using various encryption/decryption quality indicators to assess and compare its performance. The results demonstrate a good performance for the suggested communication model using all of the three studied chaotic encryption schemes. It also shows that the proposed communication mode is immune against noise distortion. One more noticed point from the result is that, the performance of the 2D Standard Map chaotic map in the proposed communication model is superior to that of the other two studied chaotic encryption schemes in terms of Spectral Distortion, Log Likelihood Ratio, Correlation Coefficient, Segmental Signal-to-Noise Ratio (SNRseg) and SNR encryption/decryption quality metrics.

ACS Style

S. F. El-Zoghdy; Hala S. El-Sayed; Osama S. Faragallah. Transmission of Chaotic-based Encrypted Audio Through OFDM. Wireless Personal Communications 2020, 113, 241 -261.

AMA Style

S. F. El-Zoghdy, Hala S. El-Sayed, Osama S. Faragallah. Transmission of Chaotic-based Encrypted Audio Through OFDM. Wireless Personal Communications. 2020; 113 (1):241-261.

Chicago/Turabian Style

S. F. El-Zoghdy; Hala S. El-Sayed; Osama S. Faragallah. 2020. "Transmission of Chaotic-based Encrypted Audio Through OFDM." Wireless Personal Communications 113, no. 1: 241-261.

Journal article
Published: 06 February 2020 in IEEE Access
Reads 0
Downloads 0
ACS Style

Masoud Alajmi; Ibrahim Elashry; Hala S. El-Sayed; Osama S. Farag Allah. Steganography of Encrypted Messages Inside Valid QR Codes. IEEE Access 2020, 8, 27861 -27873.

AMA Style

Masoud Alajmi, Ibrahim Elashry, Hala S. El-Sayed, Osama S. Farag Allah. Steganography of Encrypted Messages Inside Valid QR Codes. IEEE Access. 2020; 8 ():27861-27873.

Chicago/Turabian Style

Masoud Alajmi; Ibrahim Elashry; Hala S. El-Sayed; Osama S. Farag Allah. 2020. "Steganography of Encrypted Messages Inside Valid QR Codes." IEEE Access 8, no. : 27861-27873.

Journal article
Published: 25 November 2019 in IEEE Access
Reads 0
Downloads 0

Serious games have been used effectively in many educational domains. Games may be utilized efficiently to attract students to information security track. Learning practical knowledge about information security from a game is more engaging and less time consuming than learning through textbooks. Games that closely emulate real-world systems can improve learning about computer security above and beyond just reading technical documents and textbooks. From this perspective, this paper presents six serious games with various genres for teaching information security courses and evaluate their effectiveness as an efficient teaching tool. The study also determines which game genre is the most suitable for delivering educational contents. The obtained results proved and confirmed the hypothesis that educational games have a positive impact as a pedagogic tool on the educational process. According to users preferences’, action/adventure game genre is the most preferred game genre followed by role-play.

ACS Style

Mahmoud Mostafa; Osama S. Faragallah. Development of Serious Games for Teaching Information Security Courses. IEEE Access 2019, 7, 169293 -169305.

AMA Style

Mahmoud Mostafa, Osama S. Faragallah. Development of Serious Games for Teaching Information Security Courses. IEEE Access. 2019; 7 ():169293-169305.

Chicago/Turabian Style

Mahmoud Mostafa; Osama S. Faragallah. 2019. "Development of Serious Games for Teaching Information Security Courses." IEEE Access 7, no. : 169293-169305.