Ahmed A. Abd El-Latif

According to our database1, Ahmed A. Abd El-Latif authored at least 51 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Iris Recognition Using Multi-Algorithmic Approaches for Cognitive Internet of things (CIoT) Framework.
Future Generation Comp. Syst., 2018

Robust Encryption of Quantum Medical Images.
IEEE Access, 2018

Efficient Quantum Information Hiding for Remote Medical Image Sharing.
IEEE Access, 2018

Secure Quantum Steganography Protocol for Fog Cloud Internet of Things.
IEEE Access, 2018

2017
Efficient chaotic nonlinear component for secure cryptosystems.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Quantum color image encryption based on multiple discrete chaotic systems.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
A novel image encryption scheme based on substitution-permutation network and chaos.
Signal Processing, 2016

Chaotic watermark for blind forgery detection in images.
Multimedia Tools Appl., 2016

Response to the Letter to the Editor from Y.G. Yang et al. regarding "Dynamic watermarking scheme for quantum images based on Hadamard transform" by Xianhua Song et al., Multimedia Systems, doi: 10.1007/s00530-014-0355-3.
Multimedia Syst., 2016

New Quantum Image Steganography Scheme with Hadamard Transformation.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2016

2015
Breaking an image encryption scheme based on a spatiotemporal chaotic system.
Sig. Proc.: Image Comm., 2015

Threshold visual secret sharing with comprehensive properties based on random grids.
Signal, Image and Video Processing, 2015

New approaches for efficient information hiding-based secret image sharing schemes.
Signal, Image and Video Processing, 2015

A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system.
Signal, Image and Video Processing, 2015

Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain.
Signal, Image and Video Processing, 2015

Random grids-based visual secret sharing with improved visual quality via error diffusion.
Multimedia Tools Appl., 2015

Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery.
Multimedia Tools Appl., 2015

Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics.
Multimedia Tools Appl., 2015

Finger multibiometric cryptosystem based on score-level fusion.
IJCAT, 2015

Image encryption scheme for secure digital images based on 3D cat map and Turing machine.
Proceedings of the 7th International Conference of Soft Computing and Pattern Recognition, 2015

Selective image encryption scheme based on DWT, AES S-box and chaotic permutation.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
A Novel Perceptual Secret Sharing Scheme.
Trans. Data Hiding and Multimedia Security, 2014

Quantum image encryption based on restricted geometric and color transformations.
Quantum Information Processing, 2014

Toward accurate localization and high recognition performance for noisy iris images.
Multimedia Tools Appl., 2014

An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients.
Multimedia Tools Appl., 2014

A new image encryption scheme based on cyclic elliptic curve and chaotic system.
Multimedia Tools Appl., 2014

Dynamic watermarking scheme for quantum images based on Hadamard transform.
Multimedia Syst., 2014

Finger multibiometric cryptosystems: fusion strategy and template security.
J. Electronic Imaging, 2014

Saliency detection based on integrated features.
Neurocomputing, 2014

Color encryption scheme based on adapted quantum logistic map.
Proceedings of the Sixth International Conference on Digital Image Processing, 2014

2013
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces.
Signal Processing, 2013

A dynamic watermarking scheme for quantum images using quantum wavelet transform.
Quantum Information Processing, 2013

Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208].
Journal of Systems and Software, 2013

Two-directional two-dimensional modified Fisher principal component analysis: an efficient approach for thermal face verification.
J. Electronic Imaging, 2013

Finger Vein Recognition with Gabor Wavelets and Local Binary Patterns.
IEICE Transactions, 2013

A Fully Automatic Player Detection Method Based on One-Class SVM.
IEICE Transactions, 2013

A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

An effective preprocessing method for finger vein recognition.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

A new encryption scheme for color images based on quantum chaotic system in transform domain.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
Corrigendum to "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images" [Signal Process. 92(2012) 1069-1078]
Signal Processing, 2012

Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images.
Signal Processing, 2012

Skeleton Modulated Topological Perception Map for Rapid Viewpoint Selection.
IEICE Transactions, 2012

Finger-vein Verification Using Gabor Filter and SIFT Feature Matching.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

A new image segmentation method via fusing NCut eigenvectors maps.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

An accurate iris location method for low quality iris images.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

A new image encryption based on chaotic systems and singular value decomposition.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

A novel secret image sharing scheme based on chaotic system.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

2011
A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Chaotic Image Encryption Using Bézier Curve in DCT Domain Scrambling.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

2010
Efficient modified RC5 based on chaos adapted to image encryption.
J. Electronic Imaging, 2010


  Loading...