scispace - formally typeset
Search or ask a question
Author

Noha O. Korany

Bio: Noha O. Korany is an academic researcher from Alexandria University. The author has contributed to research in topics: Steganography & Encryption. The author has an hindex of 4, co-authored 25 publications receiving 89 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes an efficient steganography scheme based on sample comparison in Discrete Wavelet Transform (DWT) domain where the cover audio is decomposed into several multi sub-bands, and then selected coefficients of details are changed by a threshold value depending on the embedding cipher image bit.
Abstract: Steganography is the technique of hiding any secret information like text, image or video behind a cover file. Audio steganography is one of the widespread data hiding techniques that embeds secret data in audio signals. The secret data is hidden in a way that unauthorized people are not aware of the existence of the embedded data and without changing the quality of the audio signal (cover audio). Data hiding in audio signals has various applications such as protection of copyrighted audio signals, secret communication, hiding data that may influence the security and safety of governments and personnel. This paper proposes an efficient steganography scheme based on sample comparison in Discrete Wavelet Transform (DWT) domainwhere the cover audio is decomposed into several multi sub-bands, and then selected coefficients of details are changed by a threshold value depending on the embedding cipher image bit. This approach employs an original image component to perform RSA encryption on it, then cipher bits are embedded in the details components of the audio signal according to a predetermined threshold value. The performance of the algorithm has been estimated extensively against attacks, and simulation results are presented to prove the robustness of the proposed algorithm.

35 citations

Journal ArticleDOI
TL;DR: The steganography test shows that the hidden encrypted images are almost invisible at high values of SNR and are characterized by good NCC values under different types of attacks.
Abstract: Image encryption and steganography techniques are receiving a lot of interest and investigations due to their high importance in multimedia communication systems. A novel highly efficient image encryption and steganography technique are presented in this paper. For the first time, the proposed technique uses hybrid DNA encoding and Choquet's Fuzzy Integral sequences. At first, a confused version of the image, using a simple chaotic map, is encoded using DNA's bases. Four coded images are generated using the four DNA bases, namely AT, CG, GC, and TA. Parallel to that, a Choquet's fuzzy Integral sequence is generated and DNA encoded similarly to obtain four pseudo-random sequences. Secondly, the resulting four fuzzy/DNA sequences are used to diffuse the four DNA encoded images using the complementary DNA XOR rule, according to certain control code. Finally, the wavelet fusion algorithm is then used to fuse the resulting four fuzzy-DNA encoded images, to get the encrypted image. For added security, a new steganography approach is used. In particular, the encrypted image is divided into four sub-images, each of which is hidden in a different carrier image selected from a known group of carrier images according to a given key. The simulation results and security analysis confirmed the efficiency of the proposed image encryption algorithm as well as the steganography approach used for enhanced security. Ten different images with a size of 256 x 256 are used to test the proposed method. The results show that the proposed algorithm has a higher key sensitivity. The pixel correlation coefficient values are very small (between 5.3220e-04 and 0.0011 horizontally, between 8.7670e-04 and 0.0022 vertically and between 0.0002 and 0.0045 diagonally). Furthermore, the measured information entropy of the encrypted images is between 7.9970 and 7.9979 which are very close to the ideal value of 8. Additionally, the measured unified average changing intensity and number of pixels change rate values take the values between 33.46 and 33.39 and between 99.61 and 99.64, respectively, which are again closed to the ideal values. The steganography test shows that the hidden encrypted images are almost invisible at high values of SNR and are characterized by good NCC values under different types of attacks. The performance of the new proposed algorithm is proved to overcomes many other previously published image encryption techniques.

23 citations

Journal ArticleDOI
TL;DR: Choquet Fuzzy Integral (CFI) and DNA techniques have been used in this article to construct S-boxes with good statistical properties such as correlation, homogeneity, energy, entropy, and contrast.
Abstract: This article proposes a novel approach of improvising the cryptographic features of substitution-boxes (S-Box) based on the Choquet Fuzzy Integral (CFI) and DNA techniques. First, we propose a strong structure for the construction of four S-Boxes using CFI. The key for generating the CFI based (FZ) S-Boxes consists of two parts, namely, an external secret key and a secret image. Each of these FZ S-boxes is then encoded using DNA techniques, with dynamic rules selection which is dictated by a secret control code. The resultant four S-boxes are designated as DNAFZ S-Boxes. To apply for image encryption, the plain image is, at first 8-bit binary-coded, shuffled by an M-sequence, and down-sampled into four sub-images. Subsequently, the pixel values of each sub-image are replaced with the corresponding values of one of the four DNAFZ S-Boxes. Next, each DNAFZ encoded sub-image is diffused with a different DNA encoded chaotic sequence from Chen’s hyper-chaotic map. Finally, the four DNAFZ/Chaotic encoded sub-images are combined to build the final encrypted image. The proposed DNAFZ S-boxes shows excellent statistical properties under majority logic criterions such as correlation, homogeneity, energy, entropy, and contrast. Moreover, numerical simulation is used to examine the efficacy of encrypted images against different attacks. In particular, the values of the pixel correlation coefficient are found to be quite small either horizontally, vertically, or diagonally (between 7.8597e-04 and 0.00527, between 8.7856e-04 and 0.00452, and between 0.00241 and 0.00021, respectively). In addition, the information entropy of the encrypted image is found to be within the range of (7.9965:7.9989) which is very near to the ideal value of 8. As for the UACI and the NPCR, they are in the ranges between 33.46 and 33.32 and between 99.58 and 99.62, respectively. These values are also very close to the optimum ones. The results are compared to those of other encryption algorithms and proved that the proposed encryption method delivers better results than other conventional ones including LSS chaotic map, Arnold transforms, Dynamic Henon map, Hybrid chaotic map optimized substitution, and cubic S-Box.

22 citations

Journal ArticleDOI
TL;DR: In this article, a method for calculating the impulse response for rooms with partially specularly reflecting walls is presented, which combines the extended radiosity method and the conventional methods based on geometrical acoustics, ray tracing and mirror image methods.

20 citations

Proceedings ArticleDOI
08 Sep 2020
TL;DR: Good results are obtained compared to other previous approaches of using complementary code in the estimation of MIMO-OFDM channels at low SNR and channel taps equal one and two.
Abstract: A new design of MIMO-OFDM channel estimation using complementary codes is proposed in this paper. In the proposed algorithm a 2x2 space time code MIMO-OFDM system is considered. Instead of using single sided channel estimation techniques as in previous investigation [1], a two-sided approach is considered in. The suggested code on frequency-antenna distribution covers all the OFDM subcarriers. This is an advantage of our algorithm as previous investigations use only half of the subcarriers of the channel estimation. The considered channel model is a multi-tap fading channel model with doppler shift. The simulation results of the proposed algorithm are done assuming multi taps Rayleigh fading channel. Good results are obtained compared to other previous approaches of using complementary code in the estimation of MIMO-OFDM channels at low SNR and channel taps equal one and two.

11 citations


Cited by
More filters
Dissertation
04 Nov 2008
TL;DR: In this paper, the authors propose a solution to solve the problem of the problem: this paper ] of the "missing link" problem, i.i.p.II.
Abstract: II

655 citations

Journal ArticleDOI
TL;DR: The main principles, landmarks in the development, and state-of-the-art for techniques that are based on geometrical acoustics principles are described.
Abstract: Computerized room acoustics modeling has been practiced for almost 50 years up to date. These modeling techniques play an important role in room acoustic design nowadays, often including auralization, but can also help in the construction of virtual environments for such applications as computer games, cognitive research, and training. This overview describes the main principles, landmarks in the development, and state-of-the-art for techniques that are based on geometrical acoustics principles. A focus is given to their capabilities to model the different aspects of sound propagation: specular vs diffuse reflections, and diffraction.

226 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate the effectiveness and reliability of the proposed optical image compression and encryption scheme with considerable compression and security performance.

96 citations

Proceedings ArticleDOI
21 Nov 2005
TL;DR: A new particle tracing approach for the simulation of mid- and high-frequency sound using color-coded blobs traversing the paths of individual phonons, inspired by the photorealism obtained by methods like photon mapping.
Abstract: We present a new particle tracing approach for the simulation of mid- and high-frequency sound. Inspired by the photorealism obtained by methods like photon mapping, we develop a similar method for the physical simulation of sound within rooms. For given source and listener positions, our method computes a finite-response filter accounting for the different reflections at various surfaces with frequency-dependent absorption coefficients. Convoluting this filter with an anechoic input signal reproduces a realistic aural impression of the simulated room. We do not consider diffraction effects due to low frequencies, since these can be better computed by finite elements. Our method allows the visualization of a wave front propagation using color-coded blobs traversing the paths of individual phonons.

74 citations

Journal ArticleDOI
TL;DR: The HASFC model outperforms related studies by improving the hiding capacity up to 30% and maintaining the transparency of stego audio with average values of SNR at 70.4, PRD at 0.0002 and SDG at 4.7.
Abstract: Information hiding researchers have been exploring techniques to improve the security of transmitting sensitive data through an unsecured channel. This paper proposes an audio steganography model for secure audio transmission during communication based on fractal coding and a chaotic least significant bit or also known as HASFC. This model contributes to enhancing the hiding capacity and preserving the statistical transparency and security. The HASFC model manages to embed secret audio into a cover audio with the same size. In order to achieve this result, fractal coding is adopted which produces high compression ratio with the acceptable reconstructed signal. The chaotic map is used to randomly select the cover samples for embedding and its initial parameters are utilized as a secret key to enhancing the security of the proposed model. Unlike the existing audio steganography schemes, The HASFC model outperforms related studies by improving the hiding capacity up to 30% and maintaining the transparency of stego audio with average values of SNR at 70.4, PRD at 0.0002 and SDG at 4.7. Moreover, the model also shows resistance against brute-force attack and statistical analysis.

59 citations