Follow
osama elshakankiry
osama elshakankiry
Assistant Professor
Verified email at tu.edu.sa
Title
Cited by
Cited by
Year
A novel deep learning framework for copy-moveforgery detection in images
MA Elaskily, HA Elnemr, A Sedik, MM Dessouky, GM El Banby, ...
Multimedia Tools and Applications 79, 19167-19192, 2020
852020
Hiding data in video sequences using steganography algorithms
HM Kelash, OFA Wahab, OA Elshakankiry, HS El-Sayed
2013 International Conference on ICT Convergence (ICTC), 353-358, 2013
522013
Efficient audio cryptosystem based on chaotic maps and double random phase encoding
EM Elshamy, ESM El-Rabaie, OS Faragallah, OA Elshakankiry, ...
International Journal of Speech Technology 18, 619-631, 2015
322015
Comparative study of copy-move forgery detection techniques
MA Elaskily, HK Aslan, OA Elshakankiry, OS Faragallah, FE Abd El-Samie, ...
2017 Intl Conf on advanced control circuits systems (ACCS) Systems & 2017 …, 2017
262017
Utilization of steganographic techniques in video sequences
HM Kelash, OFA Wahab, OA Elshakankiry, HS El-sayed
International Journal of Computing and Network Technology 2 (01), 2014
192014
A fast hybrid image cryptosystem based on random generator and modified logistic map
AM Hemdan, OS Faragallah, O Elshakankiry, A Elmhalaway
Multimedia Tools and Applications 78, 16177-16193, 2019
152019
A proactive caching and offloading technique using machine learning for mobile edge computing users
F Alqahtani, M Al-Maitah, O Elshakankiry
Computer Communications 181, 224-235, 2022
122022
Vulnerability scanners capabilities for detecting windows missed patches: Comparative study
MA Badawy, N El-Fishawy, O Elshakankiry
Advances in Security of Information and Communication Networks: First …, 2013
82013
Comparison of audio speech cryptosystem using 2-D chaotic map algorithms
M Farouk, O Faragallah, O Elshakankiry, A Elmhalaway
Mathematics and Computer Science 1 (4), 66-81, 2016
62016
Utilizations of reversible lossless data hiding techniques in video sequences
OFA Wahab, MB Badawy, OA Elshakankiry, HS El-sayed
International Journal of Computing and Network Technology 3 (01), 2015
62015
Enhanced Fiilltterr-based SIFT Apprroach fforr Copy-Move Forrgerry Dettecttiion
M Elaskily, H Aslan, M Dessouky, A El-Samie, O Faragallah, ...
Menoufia Journal of Electronic Engineering Research 28 (1), 159-182, 2019
52019
‘Optimized mechanism for minimizing data overhead in iot environments: Design, simulation and performance evaluation
O Said, A Elnashar, O Elshakankiry
Int. J. Appl. Eng. Res 12 (23), 13663-13676, 2017
52017
Smart and automated diagnosis of covid-19 using artificial intelligence techniques
M Alajmi, OA Elshakankiry, W El-Shafai, HS El-Sayed, AI Sallam, ...
Intell. Autom. Soft Comput 32, 1403-1413, 2022
42022
Using patch management tools to enhance the signature customization for ids based on vulnerability scanner
MA Badawy, NA El-Fishawy, O Elshakankiry
2014 11th International Conference on Information Technology: New …, 2014
42014
Securing home and correspondent registrations in mobile IPv6 networks
O Elshakankiry
PQDT-UK & Ireland, 2011
42011
Using patch management tools to enhance signature customization for IDSs based on vulnerability scanners
M Alfateh, O Elshakankiry, NA El-Fishawy
32014
A novel scheme for supporting location authentication of mobile nodes
O Elshakankiry, A Carpenter, N Zhang
Security and Privacy in Mobile Information and Communication Systems: Second …, 2010
32010
A new secure binding management protocol for mobile IPv6 networks
O Elshakankiry, A Carpenter, N Zhang
2008 The Fourth International Conference on Information Assurance and …, 2008
22008
An Enhanced Image Cryptosystem 1-Dimensional Chaotic Map Based
AM Hemdan, OS Faragalla, O Elshakankiry, A Elmhalaway
Menoufia Journal of Electronic Engineering Research 27 (1), 213-236, 2018
2018
Adaptive Protocol for Management Internet of Things Systems: Analysis, Design and Performance Evaluation
O Said, A Elnashar, O Elshakankiry
International Journal of Applied Engineering Research 13 (8), 6125-6137, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20