Image
security

Software Algorithm and Hardware Implementations of Information Security Using Number Theory and Chaotic Systems

The project aims at proposing novel software algorithms for information security and their hardware implementations. The algorithms will utilize different methods based on number theory and chaos theory. Cryptography and information hiding systems will be developed for different media data types such as text, image, audio and video. The project will investigate different classes of symmetric/asymmetric and stream/block ciphers. In addition, it will explore both steganography and watermarking in spatial and frequency domains. The proposed information security solutions will be evaluated using standard performance measures. The project targets achieving technical outcomes that include hardware prototypes and a website.

security

Objective/Contributions:

  • Use chaos theory to design new information security techniques that extend on the previously developed research in different directions.
  • Use number theory in the design of new information security techniques.
  • Develop a hardware prototype that includes realizations of some of the information security techniques designed in objectives 1 and 2.
  • Develop a website that includes implementations of the designed information security techniques.
  • Publications, Master degrees, conferences and community services.
security

Outcomes

  • Design and implementation of a Multi-Visual Cryptography (MVC) system for sharing two color images using the generalized Tent map as a source of randomness, and a modified weighted average filter to significantly improve the recovered images quality.
  • Design and implementation of a progressive Multi-Secret Image Sharing (MSIS) system using the Lorenz chaotic system, where the number of used shares in the recovery process defines the quality of the recovered secrets.
  • Design and implementation of a (n, n)-Multi-Secret Image Sharing (MSIS) system for colored images using the fractional-order Rossler system.

Read More

Publications

  • Sherif H. AbdElHaleem, Salwa K. Abd-El-Hafiz, and Ahmed G. Radwan, "A Generalized Framework for Elliptic Curves Based PRNG and its Utilization in Image Encryption," Scientific Reports, vol. 12, Article no. 13278, 2022.
  • B. K. Sharobim, M. A. Fetteha, S. K. Abd-El-Hafiz, W. S. Sayed, L. A. Said and A. G. Radwan, "An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and its FPGA Realization," IEEE Access, vol. 11, pp. 9511-9520, 2023.
  • Sherif H. AbdElHaleem, Salwa K. Abd-El-Hafiz and Ahmed G. Radwan, "Secure Blind Watermarking Using Fractional-Order Lorenz System in the Frequency Domain," AEU -International Journal of Electronics and Communications, vol. 173, Article no. 154998, 2024.
  • AbdAlRahman, Alaa, Samar M. Ismail, Lobna A. Said, and Ahmed G. Radwan. "Double Fractional-order Masks Image Enhancement." In 2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES), pp. 261-264. IEEE, 2021.
  • Sherif H. AbdElHaleem, Salwa K. Abd-El-Hafiz, and Ahmed G. Radwan. "PRNG Using Primitive Roots of Primes and its Utilization in Chess-based Image Encryption." In 27th International Conference on Automation and Computing (ICAC), University of the West of England, Bristol, UK, 1-3 September, 2022.
  • Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, and Ahmed G. Radwan. "A Unified System for Encryption and Multi-Secret Image Sharing Using S-box and CRT." In 27th International Conference on Automation and Computing (ICAC), University of the West of England, Bristol, UK, 1-3 September, 2022.
  • Sherif H. AbdElHaleem, Ahmed G. Radwan and Salwa K. Abd-El-Hafiz. "Blind Watermarking Using DCT and Fractional-Order Lorenz System." In 2022 International Conference on Microelectronics (ICM), Casablanca, Morocco, 4-7 December, 2022.
  • Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Wafaa Sayed, Lobna Said and Ahmed G. Radwan. "A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform." In 2022 International Conference on Microelectronics (ICM), Casablanca, Morocco, 4-7 December, 2022.
  • Marwan A. Fetteha, Wafaa S. Sayed, Lobna A. Said, Salwa K. Abd-El-Hafiz, and Ahmed G. Radwan. "Registerless Multiplierless YCoCg-R and YCoCg Color Space Converters Hardware Implementation." In the 32nd International Conference on Computer Theory and Applications (ICCTA 2022), Arab Academy for Science, Technology & Maritime Transport (AASTMT), Alexandria, Egypt, 17-19 December, 2022.
  • Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, and Ahmed G. Radwan. "Progressive Multi-Secret Sharing of Color Images Using Lorenz Chaotic System." In International Conference on Modern Circuits and Systems Technologies (MOCAST 2023), University of West Attica, Athens, Greece, 28-30 June, 2023.
  • B.K. Sharobim, S.K. Abd-El-Hafiz, W.S. Sayed, L.A. Said and A.G. Radwan, "Pixel-based Visual Secret Sharing Using Lorenz System." Accepted in the 8th International Conference on Cloud Computing and Internet of Things (CCIOT 2023), Okinawa, Japan, 22-24 September, 2023.
  • B.K. Sharobim, S.K. Abd-El-Hafiz and A.G. Radwan, "Double Visual Cryptography Using Generalized Tent map, Rotation, and Image Filtering." Accepted in the 9th International Conference on Engineering and Emerging Technologies (ICEET 2023), Istanbul, Turkey, 27-28 October, 2023.

Information Security information security

Software Algorithm and Hardware Implementations of sing Number Theory and Chaotic Systems.

Funded by: Science, Technology & Innovation Funding Authority (STIFA) Grant  #45631.

DR.radwan dr.salwa dr.lobna dr.wafaa

Prof. Ahmed G. Radwan

PI

Prof. Salwa K. Abd-El-Hafiz

Co-PI

  Dr. Lobna A. Said

Researcher

Dr. Wafaa S. Sayed

Researcher

Eng. Sherif Bishoy Muhammad Hosam

Eng. Sherif H. AbdElHaleem

Researcher

Bishoy K. Sharobim

Researcher

Muhammad Hosam

Reasearcher