Galal A. Elkobrosy

Learn More
— In this paper, new authenticated key agreement (AKA) protocols are proposed to be used by two entities and three entities in order to establish a common session key between these entities. This key is used later to encrypt the data exchanged between the entities to assure confidentiality over public insecure channels. Authenticated key agreement protocols(More)
This paper presents a new approach for secure hiding of textual data in a colored digital image. Use of images as a cover media in steganography is based on the deficiencies in the human visual system (HVS). The proposed technique employs two independent chaotic sequences for specifying the locations where the message bits are embedded in the cover image(More)
  • 1