Tarek Sr’s research while affiliated with Helwan University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (4)


Robust and Sophisticated Combined-Layered Security: Secured 6G Mobile Network Considerations
  • Preprint
  • File available

January 2024

·

85 Reads

Tarek Sr

·

·

·

Deep learning, machine learning and artificial intelligence have been proposed for enhancing the multimedia processing and security as well as the advanced security tools for 6G networks. The vision of 6G networks refers to linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data over the network. The data hiding based on the deep learning is considered compared to the traditional steganography tools in 6G network, it requires robust and flexible/combined multi- levels of security. This paper presents the proposed vision of 6G security. This paper focuses on security levels on 6G network. The paper proposes a multi-level security system that secures the data without affecting it. The multi-level security system consists of three security levels, which are two encryption techniques and a data hiding technique. The paper carried out several simulation experiments using multi dataset (Mathwork, Yolov8 and others) to evaluate the proposed scenarios and find integration of these techniques that provides the best security performance without affecting the data. The best simulation experiments that provided the best data security performance were the integration between 2D Logistic map, SVD, and Baker Map, respectively. The proposed steganography performs better than the recent published related works and compared with the deep learning based steganography. The proposed combined system provided the better simulation results for image security. The simulation results indicated a perfect match between the original message and the decryption original message after applying the system. The results also indicated that there was no effect on the data and no loss of data.

Download

Flexible Multi-Layered Security System: Secure 6G Mobile Network Considerations

December 2023

·

63 Reads

The vision of 6G networks refers to linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data over the network. 6G network requires very high levels of security. This paper presents the proposed vision of 6G security. This paper focuses on security levels on 6G network. The paper proposes a multi-level security system that secures the data without affecting it. The multi-level security system consists of three security levels, which are two encryption techniques and a data hiding technique. The paper carried outmany simulation experiments to find the best integration of these techniques that provides the best security performance without affecting the data. The best simulation experiments that provided the best data security performance were the integration between 2D Logistic map, SVD, and Baker Map, respectively. This system provided the best simulation results for data security. The simulation results indicated a perfect match between the original message and the decryption original message after applying the system. The results also indicated that there was no effect on the data and no loss of data.


Figure 1 shows the development of the telecommunication networks' security
Figure 3 6G network architecture
Figure 5 Security requirements for wireless communication networks.
Figure 7 The utilized image in the computer simulation experiments
Figure 9 Histogram of the various image using SVD tool, A. Histogram of cover message, B. Histogram of watermarked message, C. Histogram of original message, D. Histogram of extracted message

+5

Spatial and Frequency based Data Hiding Steganography: Performance analysis Utilizing Various Classified Messages

November 2023

·

51 Reads

Tarek Sr

·

·

·

[...]

·

The proposed visions for the sixth generation wireless communications network indicate that it will have the ability to transmit massive amounts of data in a very short time. These visions require the sixth-generation network to have a high level of security. This paper focuses on the confidentiality and privacy of data on the sixth-generation wireless communications network. The paper provides a comparison between two techniques of data hiding and showing that may be used with modern security technologies in sixth-generation networks, namely LSBsteganography and SVD watermarking.This comparison between the two technologies is to determine the strength and reliability of each technology in hiding and showing data without affecting it during transmission over the network. This paper provides the comparison by implementing some simulation experiments using these technologies on different types of data such as images, numerical data, and text messages. The simulation results showed the strength and reliability of each technology in hiding and showing data, as well as the impact of each technology on the transmitted data and whether it caused any loss or not.


Performance Analysis of SVD and LSB Steganography Data Hiding Techniques: 6G Network Security Survey

October 2023

·

45 Reads

The proposed visions for the sixth generation wireless communications network indicate that it will have the ability to transmit massive amounts of data in a very short time. These visions require the sixth-generation network to have a high level of security. This paper focuses on the confidentiality and privacy of data on the sixth-generation wireless communications network. The paper provides a comparison between two techniques of data hiding and showing that may be used with modern security technologies in sixth-generation networks, namely LSBsteganography and SVD watermarking.This comparison between the two technologies is to determine the strength and reliability of each technology in hiding and showing data without affecting it during transmission over the network. This paper provides the comparison by implementing some simulation experiments using these technologies on different types of data such as images, numerical data, and text messages. The simulation results showed the strength and reliability of each technology in hiding and showing data, as well as the impact of each technology on the transmitted data and whether it caused any loss or not.