scispace - formally typeset
Search or ask a question
Author

Mohamed Elhoseny

Bio: Mohamed Elhoseny is an academic researcher from Mansoura University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 49, co-authored 240 publications receiving 7044 citations. Previous affiliations of Mohamed Elhoseny include Maharaja Agrasen Institute of Technology & Cairo University.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption.
Abstract: In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only $$\sqrt{N}$$ chaotic numbers for a square image with 3N pixels (N Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption.

43 citations

Journal ArticleDOI
TL;DR: In this article, it was shown that the Toner-verstraete, the Seevinck, and a derived monogamy inequality for three parties can be derived for the whole set of pure states distributed according to the Haar measure, and that the exploration of the entire set of states for different numbers of qubits will return effective bounds on the maximum value of all bipartite Bell violations among subsystems.
Abstract: It is a well-known fact that both quantum entanglement and nonlocality (implied by the violation of Bell inequalities) constitute quantum correlations that cannot be arbitrarily shared among subsystems. They are both monogamous, albeit in a different fashion. In the present contribution we focus on nonlocality monogamy relations such as the Toner-Verstraete, the Seevinck, and a derived monogamy inequality for three parties and compare them with multipartite nonlocality measures for the whole set of pure states distributed according to the Haar measure. In this numerical endeavor, we also see that, although monogamy relations for nonlocality cannot exist for more than three parties, in practice the exploration of the whole set of states for different numbers of qubits will return effective bounds on the maximum value of all bipartite Bell violations among subsystems. Hence, we shed light on the effective nonlocality monogamy bounds in the multiqubit case.

43 citations

Journal ArticleDOI
TL;DR: A comparative analysis of the proposed encryption method with the Catalan numbers and data encryption standard (DES) algorithm, which is performed with machine learning-based identification of the encryption method using ciphertext only, showed that it was much more difficult to recognize ciphertext generated with theCatalan method than one made with the DES algorithm.
Abstract: This article presents a novel data encryption technique suitable for Internet of Things (IoT) applications. The cryptosystem is based on the application of a Catalan object (as a cryptographic key) that provides encryption based on combinatorial structures with noncrossing or nonnested matching. The experimental part of this article includes a comparative analysis of the proposed encryption method with the Catalan numbers and data encryption standard (DES) algorithm, which is performed with machine learning-based identification of the encryption method using ciphertext only. These tests showed that it is much more difficult to recognize ciphertext generated with the Catalan method than one made with the DES algorithm. System reliability depends on the quality of the key, therefore, statistical testing proposed by National Institute of Standards and Technology was also performed. Twelve standard tests, the approximate entropy measurement, and random digression complexity analysis are applied in order to evaluate the quality of the generated Catalan key. A proposal for applying this method in e-Health IoT is also given. Possibilities of applying this method in the IoT applications for smart cities data storage and processing are provided.

42 citations

Journal ArticleDOI
TL;DR: Performance evaluation shows the CTOS and MTOP outperform existing task offloading and scheduling methods in the VCFN in terms of costs and the deadline for IoT applications.
Abstract: These days, the usage of the internet of Vehicle Things (IVoT) applications such as E-Business, E-Train, E-Ambulance has been growing progressively. These applications require mobility-aware delay-sensitive services to execute their tasks. With this motivation, the study has the following contribution. Initially, the study devises a novel cooperative vehicular fog cloud network (VFCN) based on container microservices which offers cost-efficient and mobility-aware services with rich resources for processing. This study devises the cost-efficient task offloading and scheduling (CEMOTS) algorithm framework, which consists of the mobility aware task offloading phase (MTOP) method, which determines the optimal offloading time to minimize the communication cost of applications. Furthermore, CEMOTS offers Cooperative Task Offloading Scheduling (CTOS), including task sequencing and scheduling. The goal is to reduce the application costs of communication cost and computational costs under a given deadline constraint. Performance evaluation shows the CTOS and MTOP outperform existing task offloading and scheduling methods in the VCFN in terms of costs and the deadline for IoT applications.

42 citations

Journal ArticleDOI
TL;DR: A combinational algorithm is proposed for modelling a nano silicon-on-insulator metal–oxide–semiconductor field effect transistor (SOI MOSFET) characteristic and results represent that the implemented quantum genetic algorithm for prediction of device characteristics is more effective and accurate than GA.
Abstract: Progress in the technology of submicron semiconductor device, which makes a short-channel and quantum effects, having equations of nonlinear modelling, leads to complicated and time-consuming calculations. In order to control these complexities and obtain the device characteristics according to device parameters, a faster method is needed. In this paper, a combinational algorithm is proposed for modelling a nano silicon-on-insulator metal–oxide–semiconductor field effect transistor (SOI MOSFET) characteristic. The proposed method shows the same device characteristics with lower input parameters. In this method, a combination of genetic algorithm (GA) and artificial neural network are used. Then quantum evolutionary algorithm (QEA) is employed instead of genetic algorithm (GA) for comparing and modifying algorithm. Results show that the algorithm’s accuracy is 95% and 98% for test data of GA and QGA, respectively. Moreover, the reduction percentage of input parameters are 11% and 52% for GA and QEA, respectively. The simulation results represent that the implemented quantum genetic algorithm for prediction of device characteristics is more effective and accurate than GA.

42 citations


Cited by
More filters
01 Jan 2004
TL;DR: Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance and describes numerous important application areas such as image based rendering and digital libraries.
Abstract: From the Publisher: The accessible presentation of this book gives both a general view of the entire computer vision enterprise and also offers sufficient detail to be able to build useful applications. Users learn techniques that have proven to be useful by first-hand experience and a wide range of mathematical methods. A CD-ROM with every copy of the text contains source code for programming practice, color images, and illustrative movies. Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance. Topics are discussed in substantial and increasing depth. Application surveys describe numerous important application areas such as image based rendering and digital libraries. Many important algorithms broken down and illustrated in pseudo code. Appropriate for use by engineers as a comprehensive reference to the computer vision enterprise.

3,627 citations

01 Jun 2005

3,154 citations

01 Sep 2008
TL;DR: The Methodology used to Prepare the Guideline Epidemiology Incidence Etiology and Recommendations for Assessing Response to Therapy Suggested Performance Indicators is summarized.
Abstract: Executive Summary Introduction Methodology Used to Prepare the Guideline Epidemiology Incidence Etiology Major Epidemiologic Points Pathogenesis Major Points for Pathogenesis Modifiable Risk Factors Intubation and Mechanical Ventilation Aspiration, Body Position, and Enteral Feeding Modulation of Colonization: Oral Antiseptics and Antibiotics Stress Bleeding Prophylaxis, Transfusion, and Glucose Control Major Points and Recommendations for Modifiable Risk Factors Diagnostic Testing Major Points and Recommendations for Diagnosis Diagnostic Strategies and Approaches Clinical Strategy Bacteriologic Strategy Recommended Diagnostic Strategy Major Points and Recommendations for Comparing Diagnostic Strategies Antibiotic Treatment of Hospital-acquired Pneumonia General Approach Initial Empiric Antibiotic Therapy Appropriate Antibiotic Selection and Adequate Dosing Local Instillation and Aerosolized Antibiotics Combination versus Monotherapy Duration of Therapy Major Points and Recommendations for Optimal Antibiotic Therapy Specific Antibiotic Regimens Antibiotic Heterogeneity and Antibiotic Cycling Response to Therapy Modification of Empiric Antibiotic Regimens Defining the Normal Pattern of Resolution Reasons for Deterioration or Nonresolution Evaluation of the Nonresponding Patient Major Points and Recommendations for Assessing Response to Therapy Suggested Performance Indicators

2,961 citations