Image
security

Software Algorithm and Hardware Implementations of Information Security Using Number Theory and Chaotic Systems

The project aims at proposing novel software algorithms for information security and their hardware implementations. The algorithms will utilize different methods based on number theory and chaos theory. Cryptography and information hiding systems will be developed for different media data types such as text, image, audio and video. The project will investigate different classes of symmetric/asymmetric and stream/block ciphers. In addition, it will explore both steganography and watermarking in spatial and frequency domains. The proposed information security solutions will be evaluated using standard performance measures. The project targets achieving technical outcomes that include hardware prototypes and a website.

security

Objective/Contributions:

  • Use chaos theory to design new information security techniques that extend on the previously developed research in different directions.
  • Use number theory in the design of new information security techniques.
  • Develop a hardware prototype that includes realizations of some of the information security techniques designed in objectives 1 and 2.
  • Develop a website that includes implementations of the designed information security techniques.
  • Publications, Master degrees, conferences and community services.
security

Outcomes

  • Design and implementation of a Multi-Visual Cryptography (MVC) system for sharing two color images using the generalized Tent map as a source of randomness, and a modified weighted average filter to significantly improve the recovered images quality.
  • Design and implementation of a progressive Multi-Secret Image Sharing (MSIS) system using the Lorenz chaotic system, where the number of used shares in the recovery process defines the quality of the recovered secrets.
  • Design and implementation of a (n, n)-Multi-Secret Image Sharing (MSIS) system for colored images using the fractional-order Rossler system.

Read More

Publications

  • Sherif H. AbdElHaleem, Salwa K. Abd-El-Hafiz, and Ahmed G. Radwan, "A Generalized Framework for Elliptic Curves Based PRNG and its Utilization in Image Encryption," Scientific Reports, vol. 12, Article no. 13278, 2022.
  • B. K. Sharobim, M. A. Fetteha, S. K. Abd-El-Hafiz, W. S. Sayed, L. A. Said and A. G. Radwan, "An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and its FPGA Realization," IEEE Access, vol. 11, pp. 9511-9520, 2023.
  • Sherif H. AbdElHaleem, Salwa K. Abd-El-Hafiz and Ahmed G. Radwan, "Secure Blind Watermarking Using Fractional-Order Lorenz System in the Frequency Domain," AEU -International Journal of Electronics and Communications, vol. 173, Article no. 154998, 2024.
  • AbdAlRahman, Alaa, Samar M. Ismail, Lobna A. Said, and Ahmed G. Radwan. "Double Fractional-order Masks Image Enhancement." In 2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES), pp. 261-264. IEEE, 2021.
  • Sherif H. AbdElHaleem, Salwa K. Abd-El-Hafiz, and Ahmed G. Radwan. "PRNG Using Primitive Roots of Primes and its Utilization in Chess-based Image Encryption." In 27th International Conference on Automation and Computing (ICAC), University of the West of England, Bristol, UK, 1-3 September, 2022.
  • Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, and Ahmed G. Radwan. "A Unified System for Encryption and Multi-Secret Image Sharing Using S-box and CRT." In 27th International Conference on Automation and Computing (ICAC), University of the West of England, Bristol, UK, 1-3 September, 2022.
  • Sherif H. AbdElHaleem, Ahmed G. Radwan and Salwa K. Abd-El-Hafiz. "Blind Watermarking Using DCT and Fractional-Order Lorenz System." In 2022 International Conference on Microelectronics (ICM), Casablanca, Morocco, 4-7 December, 2022.
  • Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Wafaa Sayed, Lobna Said and Ahmed G. Radwan. "A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform." In 2022 International Conference on Microelectronics (ICM), Casablanca, Morocco, 4-7 December, 2022.
  • Marwan A. Fetteha, Wafaa S. Sayed, Lobna A. Said, Salwa K. Abd-El-Hafiz, and Ahmed G. Radwan. "Registerless Multiplierless YCoCg-R and YCoCg Color Space Converters Hardware Implementation." In the 32nd International Conference on Computer Theory and Applications (ICCTA 2022), Arab Academy for Science, Technology & Maritime Transport (AASTMT), Alexandria, Egypt, 17-19 December, 2022.
  • Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, and Ahmed G. Radwan. "Progressive Multi-Secret Sharing of Color Images Using Lorenz Chaotic System." In International Conference on Modern Circuits and Systems Technologies (MOCAST 2023), University of West Attica, Athens, Greece, 28-30 June, 2023.
  • B.K. Sharobim, S.K. Abd-El-Hafiz, W.S. Sayed, L.A. Said and A.G. Radwan, "Pixel-based Visual Secret Sharing Using Lorenz System." Accepted in the 8th International Conference on Cloud Computing and Internet of Things (CCIOT 2023), Okinawa, Japan, 22-24 September, 2023.
  • B.K. Sharobim, S.K. Abd-El-Hafiz and A.G. Radwan, "Double Visual Cryptography Using Generalized Tent map, Rotation, and Image Filtering." Accepted in the 9th International Conference on Engineering and Emerging Technologies (ICEET 2023), Istanbul, Turkey, 27-28 October, 2023.

Journal Papers

Fundamental Component in encryption systems

Elliptic Curves (ECs) have shown their efcacy as a safe fundamental component in encryption systems, mainly when used in Pseudorandom Number Generator (PRNG) design. This paper proposes a framework for designing EC-based PRNG and maps recent PRNG design techniques into the framework, classifying

Multi-Secret Image Sharing (MSIS)

Multi-Secret Image Sharing (MSIS) Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper proposes a simple and

The Development of a Pseudo Random Number Generator (PRNG)

This paper investigates two different blind watermarking systems in the frequency domain with the development of a Pseudo Random Number Generator (PRNG), based on a fractional-order chaotic system, for watermark encryption. The methodology is based on converting the cover image to the YCbCr color

Conference Papers

Registerless Multiplierless YCoCg-R and YCoCg Color Space Converters Hardware Implementation

Registerless Multiplierless YCoCg-R and YCoCg Color Space Converters Hardware Implementation Multimedia data, e.g., images and videos, are widely used over the internet and on computers. Image processing applications require color space conversion to be able to deal with these types of data more

PRNG Using Primitive Roots of Primes and its Utilization in Chess-based Image Encryption

PRNG Using Primitive Roots of Primes and its Utilization in Chess-based Image Encryption Recently, number theory has proved its importance in cryptography because of its well-known hard problems. For instance, a primitive root for a prime number shows a special property of uniqueness when raised to

Progressive Multi-Secret Sharing of Color Images Using Lorenz Chaotic System

Progressive Multi-Secret Sharing of Color Images Using Lorenz Chaotic System Multi-Secret Image Sharing (MSIS) systems share multiple images to multiple participants in unintelligible forms that can be recovered using all the shares. This paper employs the concept of progressive secret sharing with

Pixel-based Visual Secret Sharing Using Lorenz System

Pixel-based Visual Secret Sharing Using Lorenz System Visual Secret Sharing (VSS) allows a user to send an image in the form of shares to different participants. Every share can not reveal the secret alone, and only all shares together can reveal the secret with fast recovery. This paper proposes a

Double Fractional-order Masks Image Enhancement

Double Fractional-order Masks Image Enhancement Image enhancement is better achieved when fractional-order masks are used rather than integer-order ones, this is due to the flexibility offractional-order parameters control. This paper proposes a combination of fractional-order masks to be used in

Blind Watermarking Using DCT and Fractional-Order Lorenz System

Blind Watermarking Using DCT and Fractional-Order Lorenz System This paper presents a new blind watermarking system based on the Discrete Cosine Transform (DCT). The system's security is increased by encrypting the watermark image using the fractional-order Lorenz system. After converting the cover

A Unified System for Encryption and Multi-Secret Image Sharing Using S-box and CRT

A Unified System for Encryption and Multi-Secret Image Sharing Using S-box and CRT Multi-Secret Image Sharing (MSIS) is used when multiple images need to be shared to multiple participants, but the images can not be recovered without the presence of all shares. In this paper, a unified system for

A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform

A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform Nowadays, with the rapid growth in information, a fast and secure method is eagerly needed to share images. (n, n)-Visual Secret Sharing (VSS) is used to share a secret image into n shares, where the secret can only be

Information Security information security

Software Algorithm and Hardware Implementations of sing Number Theory and Chaotic Systems.

Funded by: Science, Technology & Innovation Funding Authority (STIFA) Grant  #45631.