关注
Mohamed Gamal Abdelfattah
Mohamed Gamal Abdelfattah
在 mans.edu.eg 的电子邮件经过验证
标题
引用次数
引用次数
年份
Compact optical asymmetric cryptosystem based on unequal modulus decomposition of multiple color images
M Abdelfattah, SF Hegazy, NFF Areed, SSA Obayya
Optics and Lasers in Engineering 129, 106063, 2020
302020
Optical cryptosystem for visually meaningful encrypted images based on gyrator transform and Hénon map
MG Abdelfattah, SF Hegazy, NFF Areed, SSA Obayya
Optical and Quantum Electronics 54 (2), 113, 2022
162022
Hybrid watermarking scheme for copyright protection using chaotic maps cryptography
MA Mohamed, M Aboutaleb, MG Abdel-Fattah, AS Samrah
International Journal of Computer Applications 126 (4), 13-26, 2015
122015
Optical essential secret image sharing using unequal modulus decomposition and gyrator transform
MG Abdelfattah, SF Hegazy, SSA Obayya
Optical and Quantum Electronics 56 (1), 107, 2024
12024
Survey Image Cryptanalysis Using a Substitution Box Based Chaotic Map
A Rabea, M Abdelfattah, A Takieldeen, A Khalil
International Journal of Telecommunications 3 (02), 1-12, 2023
12023
Optimization of Feature Selection Using Greylag Goose Optimization Algorithm for Monkeypox
A Eslam, MG Abdelfattah, ESM El-Kenawy, HED Moustafa
Journal of Artificial Intelligence in Engineering Practice 1 (2), 2024
2024
Classification of Monkeypox Using Greylag Goose Optimization (GGO) Algorithm.
A Eslam, MG Abdelfattah, ESM El-Kenawy, H El-Din Moustafa
Fusion: Practice & Applications 16 (2), 2024
2024
Concealed Chosen Plaintext Attack on Multiple S-boxes Based Image Encryption.
A Rabea, MG Abdelfattah, AT Khalil, AE Takieldeen
Journal of Cybersecurity & Information Management 14 (1), 2024
2024
Medical Image Classification for Monkeypox Case using Deep Learning Algorithms: A Survey
A Islam, MG Abdelfattah, ESM El-Kenawy, HED Moustafa
Full Length Article 5 (2), 47-7-57, 2023
2023
Sunflower-Shaped Patch Antenna for Breast Tumor Microwave Imaging.
AA Abdelfatah, MG Abdelfattah, NF F Areed
International Journal of Microwave & Optical Technology 18 (5), 2023
2023
Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
MA Mohamed, A Ibrahim, MG Abd-El-Fattah, AS Samrah
International Journal of Computer Applications 126 (3), 2015
2015
系统目前无法执行此操作,请稍后再试。
文章 1–11