Abeer Twakol

Work place: Mansoura University / Communication and Electronics Engineering Department, Mansoura, 35516, Egypt

E-mail: abeer.twakol@mans.edu.eg

Website:

Research Interests:

Biography

Abeer T. Khalil received the B.Sc. and Ph.D. degrees from the Electronics and Communications Engineering Department, Faculty of Engineering, Mansoura University, in 2001 and 2013, respectively. She is currently working as an Associate Professor at the Electronics and Communications Department, Faculty of Engineering, Mansoura University. She has published more than 30 articles and supervised ten postgraduate students in many universities. She is interested in wireless networking and hardware realizations of digital systems.

Author Articles
A Secure and Efficient Cryptography System Based on Chaotic Maps for Securing Data Image in Fog Computing

By Samaa Y. Tarabay Abeer Twakol Ahmed S. Samrah Ibrahim Yasser

DOI: https://doi.org/10.5815/ijcnis.2023.01.06, Pub. Date: 8 Feb. 2023

The huge availability and prosperity of net technology results in raised on-line media sharing over the cloud platform which has become one of the important resources and tools for development in our societies. So, in the epoch of enormous data great amount of sensitive information and transmission of different media transmitted over the net for communication. And recently, fog computing has captured the world's attention due to their inherent features relevant compared to the cloud domain, But this push to head for many issues related to data security and privacy in fog computing which it's still under studied in their initial juncture. Therefore, in this paper, we will review a security system that relies on encryption as a kind of effective solution to secure image data. We use an approach of using chaotic map plus space curve techniques moreover the confusion and diffusion strategies are carried out utilizing Hilbert curvature and chaotic map such as two-dimensional Henon map (2D-HM) to assert image confusion with pixel level permutation .Also we relied in our system the way of shuffling the image with blocks and use a key for each block, which is chooses randomly to have a high degree of security. The efficiency of the proposed technique has been tested utilizing different investigations like analysis of entropy [7.9993], NPCR [99.6908%] and finally UACI [33.6247%]. Analysis of results revealed that the proposed system of image encryption technique has favorable effects, and can achieve a good results moreover it fights different attacks and by comparing with another techniques denote that our proposed fulfills high security level with high quality.

[...] Read more.
Other Articles