Image encryption: a communication perspective FE Abd El-Samie, HEH Ahmed, IF Elashry, MH Shahieen, OS Faragallah, ... Crc Press, 2013 | 125 | 2013 |
Homomorphic image encryption IF Elashry, OS Farag Allah, AM Abbas, S El-Rabaie, FE Abd El-Samie Journal of Electronic Imaging 18 (3), 033002-033002-14, 2009 | 86 | 2009 |
Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication OS Faragallah, W El-Shafai, AI Sallam, I Elashry, ESM EL-Rabaie, A Afifi, ... Journal of Ambient Intelligence and Humanized Computing, 1-25, 2022 | 53 | 2022 |
Efficient chaotic-based image cryptosystem with different modes of operation IF Elashry, W El-Shafai, ES Hasan, S El-Rabaie, AM Abbas, ... Multimedia Tools and Applications, 1-23, 2020 | 51 | 2020 |
Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset I Eldokany, ESM El-Rabaie, SM Elhalafawy, MA Zein Eldin, MH Shahieen, ... Wireless Personal Communications 84, 475-521, 2015 | 35 | 2015 |
A new method for encrypting images with few details using Rijndael and RC6 block ciphers in the electronic code book mode IF Elashry, OS Faragallah, AM Abbas, S El-Rabaie, FE Abd El-Samie Information security journal: A global perspective 21 (4), 193-205, 2012 | 34 | 2012 |
Steganography of encrypted messages inside valid QR codes M Alajmi, I Elashry, HS El-Sayed, OSF Allah IEEE Access 8, 27861-27873, 2020 | 29 | 2020 |
Digital image encryption IE El-Ashry MS. c Thesis, Electronics and Electrical Communications Engineering …, 2010 | 23 | 2010 |
Efficient optical double image cryptosystem using chaotic mapping-based Fresnel transform OS Faragallah, A Afifi, IF Elashry, EA Naeem, HM El-Hoseny, HS El-sayed, ... Optical and Quantum Electronics 53 (6), 305, 2021 | 21 | 2021 |
A password-based authentication system based on the CAPTCHA AI problem M Alajmi, I Elashry, HS El-Sayed, OS Faragallah IEEE Access 8, 153914-153928, 2020 | 16 | 2020 |
Fusion-based encryption scheme for cancelable fingerprint recognition FG Hashad, O Zahran, ESM El-Rabaie, IF Elashry, FE Abd El-Samie Multimedia Tools and Applications 78, 27351-27381, 2019 | 16 | 2019 |
Jhanwar-Barua’s identity-based encryption revisited I Elashry, Y Mu, W Susilo International Conference on Network and System Security, 271-284, 2015 | 15 | 2015 |
A new diffusion mechanism for data encryption in the ECB mode IF Elashry, OSF Allah, AM Abbas, S El-Rabaie 2009 International Conference on Computer Engineering & Systems, 288-293, 2009 | 14 | 2009 |
Efficient chaotic-Baker-map-based cancelable face recognition OS Faragallah, EA Naeem, W El-Shafai, N Ramadan, HEH Ahmed, ... Journal of Ambient Intelligence and Humanized Computing, 1-39, 2023 | 13 | 2023 |
A resilient identity‐based authenticated key exchange protocol I Elashry, Y Mu, W Susilo Security and Communication Networks 8 (13), 2279-2290, 2015 | 13 | 2015 |
An efficient variant of Boneh-Gentry-Hamburg’s identity-based encryption without pairing I Elashry, Y Mu, W Susilo International Workshop on Information Security Applications, 257-268, 2014 | 8 | 2014 |
Efficient three-dimensional video cybersecurity framework based on double random phase encoding OS Faragallah, W El-Shafai, A Afifi, I Elashry, MA AlZain, JF Al-Amri, ... La Trobe, 2021 | 6 | 2021 |
Identity-based mediated RSA revisited I Elashry, Y Mu, W Susilo 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 6 | 2013 |
Efficient signal and protocol level security for network communication EA Naeem, AEA Abdelaal, AA Eyssa, FM Al_azrak, R A. Ahmed, ... International Journal of Speech Technology 23, 399-424, 2020 | 5 | 2020 |
Improved RC6 block cipher based on data dependent rotations OS Faragallah, IF Elashry, A AlGhamdi, W El-Shafai, S El-Rabaie, ... CMC-COMPUTERS MATERIALS & CONTINUA 70 (1), 1921-1934, 2022 | 4 | 2022 |