omar_ahmed1

Omar Reyad Mohamed

Lecturer - مدرس علوم الحاسب

Faculty of science

Address: محافظة سوهاج-مدينة ناصر

1

Like
Multi-filter Score-Level Fusion for Fingerprint Verification
Biometric systems are widely used in various applications of today’s authentication technology. The unimodal systems suffer from var- ious stumbling blocks such as noisy inputs, non-universality, intra-class variability and imposter spoofing which affects the system performance and accuracy. To effectively handle these problems, two or more individual modalities are used. In this paper, we presented a multimodal approach for fingerprint ... Read more

2018 | Keywords Encryption, Color, Gray-scale,
A novel image encryption scheme based on different block sizes for grayscale and color images
In this paper, two image encryption schemes are proposed for grayscale and color images. The two encryption schemes are based on dividing each image into blocks of different sizes. In the first scheme, the two dimension (2D) input image is divided into various blocks of size N × N. Each plainimage block is transformed into a one dimensional (1D) array ... Read more

2018 | Keywords Encoding and Decoding,
Text Message Encoding Based on Elliptic Curve Cryptography and a Mapping Methodology
Elliptic Curve Cryptography (ECC) is a public-key cryptosystem which can be used for message encryption, key agreement protocols and digital signature applications. ECC offers high level of security with smaller key sizes makes it ideal fo r applications which run on small devices that have power and memory constraints such as smart cards and cell phones. Encoding (converting a plaintext ... Read more

2018 | Keywords SDN, Network Security,
New SDN-Oriented Distributed Network Security System
Software-Defined Network (SDN) is a network technology aimed to open new possibilities in network management and orchestration. This is important in future (especially mobile) networks, where virtualization of resources and network functions is the basic paradigm. SDN has been proposed to programmatically control networks, facilitating deployment of new applications and services, as well as tuning network policy and performance. It ... Read more

Image Encryption using Chaos-Driven Elliptic Curve Pseudo-Random Number Generators
Pseudo-random number sequences which using the form of elliptic curves can be generated efficiently in software or hardware by the same methods that are used for the implementation of elliptic curve (EC) public-key cryptosystems. In th is paper, we proposed a secure image encryption scheme using key sequences generated from Chaos-Driven Elliptic Curve Pseudo-random Number Generator (C-D ECPRNG). This key ... Read more

Pseudo-random sequence generation from elliptic curves over a finite field of characteristic 2
In this paper, the randomness of binary sequences generated from elliptic curves over a finite field of characteristic 2 is studied. A scheme of construction based on the Chaos-Driven Elliptic Curve Pseudo-random Number Generator (C-D ECPRNG) is proposed. The generators based of this scheme are verified by using tests from the NIST Statistical Test Suite to analyze their statistical properties. ... Read more

2016 | Keywords Biometric authentication,
An integrated smoothing method for fingerprint recognition enhancement
Fingerprint identification systems are one of the most well-known and publicized biometrics because of the inherent ease in acquisition, the numerous sources (ten fingers) available for collection, and their established use by law enforcement and immigration. These systems rely on the unique biological characteristics of individuals to accurately verify their identities. To get reliable and accurate verification results, these systems ... Read more

On pseudo-random number generators using elliptic curves and chaotic systems
Elliptic Curve Cryptography (ECC) is a relatively recent branch of cryptography which is based on the arithmetic on elliptic curves and security of the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Elliptic curve cryptographic schemes are public-key mechanisms that provide encryption, digital signature and key exchange capabilities. Elliptic curve algorithms are also applied to generation of sequences of ... Read more

Image Encryption Using Koblitz’s Encoding and New Mapping Method Based on Elliptic Curve Random Number Generator
Elliptic Curve Cryptography (ECC) has attractive advantages compared to other public-key cryptosystems that motivated cryptographers for using it. ECC offers equal security for a smaller key sizes, thereby reducing processing overhead, making it ideal for small devices, key agreement protocols and digital signature applications. Images are data types that occasionally include secret information, such as faces, places and signatures. Encryption ... Read more