Conference Papers

    1. Ahmed A. Abd El-Latif, Li Li, Ning Wang, Xiamu Niu” Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems” Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011, p 369-373, 2011.

    1. Ahmed A. Abd El-Latif , Li Li , Ning Wang, Qiong Li and Xiamu Niu, “ A New Image Encryption Based on Chaotic Maps and Singular Value Decomposition. Proc. SPIE. 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012) 83343F (May 1, 2012) doi: 10.1117/12.964281g.


    1. Ning Wang, Qiong Li, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu, “A Novel Multi-Division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault” Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011, p 101-104, 2011.


    1. Li Li, Ahmed A. Abd El-Latif, Chuanjun Wang, Qiong Li and Xiamu Niu” A novel secret image sharing scheme based on chaotic system” Proc. SPIE. 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012) 833412 (May 1, 2012) doi: 10.1117/12.946098.


    1. Tiejun Zhang, Ahmed A. Abd El-Latif, Ning Wang, Qiong Li, Xiamu Niu, “A new image segmentation method via fusing NCut eigenvectors maps” Proc. SPIE. 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012) 833430 (May 1, 2012) doi: 10.1117/12.956472.


    1. Jia-Liang Peng, Ning Wang, Ahmed A. Abd El-Latif, Qiong Li, Xiamu Niu “Finger-vein Verification using Gabor Segmentation and SIFT Feature Matching” Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012, p 45-48, 2012.


    1. Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Tiejun Zhang, Peng Jia-Liang, “An Accurate Iris Location Method for low quality iris images”, Proc. SPIE. 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012) 833411 (May 1, 2012) doi: 10.1117/12.946095.


    1. Li Li, Ahmed A. Abd El-Latif, Xuehu Yan, Shen Wang, Xiamu Niu, “A lossless secret image sharing scheme based on steganography” The second international conference on instrumentation & measurement, computer, communication and control ( IMCCC 2012).


    1. Ahmed A. Abd El-Latif, Ning Wang, Jia-Liang Peng, Qiong Li, Xiamu Niu “A new encryption scheme for color images based on quantum chaotic system in transform domain” Fifth International Conference on Digital Image Processing (ICDIP 2013).


    1. Jialiang Peng, Qiong Li, Ning Wang, Ahmed A. Abd El-Latif, Xiamu Niu,” An Effective Preprocessing Method for Finger Vein Recognition” Fifth International Conference on Digital Image Processing (ICDIP 2013).


    1. Tiejun Zhang, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu,” Local Shape Feature for Cartoon Image Retrieval”. Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2013.


    1. Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Xuehu Yan, Xiamu Niu, “A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images” The 2013 International Symposium on Biometrics and Security Technologies. ( EI).


    1. Tiejun Zhang, Ahmed A. Abd El-Latif, Qi Han, Xiamu Niu “Selective encryption for cartoon images” Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2013 5th International Conference on (Volume:2 ) pages (198-201) : 26-27 Aug. 2013.


    1. Alaa Zhagloul, Tiejun Zhang, Mohamed Amin, Ahmed A. Abd El-Latif” Color Encryption Scheme Based on Adapted Quantum Logistic Map” Proc. SPIE 9159, Sixth International Conference on Digital Image Processing (ICDIP 2014), 915922 (April 16, 2014); doi:10.1117/12.2064628.


    1. T. J. Zhang, I.M. Manhrawy, A.A. Abdo, A.A. A. El-Latif, R. Rhouma, "Cryptanalysis of Elementary Cellular Automata Based Image Encryption", 2014 International Conference on Electronic Engineering and Information Science (ICEEIS 2014), June 21-22, 2014, Harbin, China.


    1. Tiejun Zhang, Hongguo Zhang, H. D. Hou, Ahmed. A. Abd El–Latif, Handan Hou, , ” A Robust Watermarking for 2D CAD Graphic Based on Coordinates Modification” International Conference of Electronic Engineering and Information Science 2015 (ICEEIS2015). CRC press 2015.


    1. Akram Belazi, Ahmed A. Abd El-Latif, Rhouma Rhouma, Safia Belguith, ” Selective image encryption scheme based on DWT, AES S-box and chaotic permutation”, International Wireless Communications and Mobile Computing Conference, IWCMC 2015, Dubrovnik, Croatia, August 24-28, 2015. IEEE 2015, ISBN 978-1-4799-5344-8.


    1. Nehal A. Mohamed, Alaa Zhagloul , Mostafa Abd El-Azeim, Ahmed A. Abd El-Latif” An image encryption scheme for secure digital images based on 3D cat map and Turing machine” 7th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2015).


    1. Li Li, Ahmed A. Abd El-Latif, Aya El-Fetyani, Mohamed Amin “Lossless secret image sharing based on integer discrete cosine transform” International Science Index Vol:3, No:1, 2016 waset.org/abstracts/36824.

    2. Mohamed Behery, Mohamed Amin, Xianhua Song, Ahmed A. Abd El-Latif , Quantum image encryption based on scrambling-diffusion (SD) approach .2016 2nd International Conference on Frontiers of Signal Processing (ICFSP 2016).

    3. Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Mohamed Amin, “New quantum image steganography scheme with Hadamard Transformation”. The 2nd International Conference on Advanced Intelligent Systems and Informatics (AISI’16) Best Student Paper Award


    1. Li Li, Bassem Abd-El-Atty, Mohamed Amin, Ahmed A. Abd El-Latif “Improvement of quantum steganography protocol based on the tensor product of Bell states” 2016 International Conference on Mathematical, Computational and Statistical Sciences and Engineering(MCSSE2016)


    1. Tiejun Zhang, Bassem Abd-El-Atty, Mohamed Amin, Ahmed A. Abd El-Latif QISLSQb: A quantum image steganography scheme based on least significant qubit “.2016 International Conference on Mathematical, Computational and Statistical Sciences and Engineering(MCSSE2016)


    1. Jia-Liang Peng, Ahmed A. Abd El-Latif, Akram Belazi, Zbigniew Kotulski ”Efficient Chaotic Nonlinear Component for Secure Cryptosystems” 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).


    1. Li Li, Bassem Abd El-Atty, Ahmed A. Abd El-Latif, Ahmed Ghoneim “A quantum color image encryption based on multiple discrete chaotic systems” 4th International Conference on Cryptography and Security Systems (C&SS'17), FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, Prague, Czech Republic, 3 - 6 September, 2017.


    1. Ramadan Gad, Ahmed A. Abd El-Latif, Sherif Elseuofi, Hany M Ibrahim, Mahmoud Elmezain, Wael Said, "IoT Security based on Iris Verification Using Multi-Algorithm Feature Level Fusion Scheme" International conference on Computer Applications & Information Security (ICCAIS’2019).


    1. Li Li, Bassem Abd-El-Atty, Sherif Elseuofi, Basma Abd El-Rahiem, Ahmed A. Abd El-Latif, " Quaternion and multiple chaotic systems based pseudo-random number generator" International conference on Computer Applications & Information Security (ICCAIS’2019).


    1. Ramadan Gad, Ahmed A. Abd El-Latif, Sherif Elseuofi, Hany M Ibrahim, Mahmoud Elmezain, Wael Said, "IoT Security based on Iris Verification Using Multi-Algorithm Feature Level Fusion Scheme" International conference on Computer Applications & Information Security (ICCAIS’2019).


    1. Li Li, Bassem Abd-El-Atty, Sherif Elseuofi, Basma Abd El-Rahiem, Ahmed A. Abd El-Latif " Quaternion and multiple chaotic systems based pseudo-random number generator" International conference on Computer Applications & Information Security (ICCAIS’2019).


    1. Jialiang Peng, Bassem Abd El-Atty, Hany S. Khalifa, Ahmed A. Abd El-Latif "Image steganography algorithm based on key matrix generated by quantum walks" The 11th International Conference on Digital Image Processing


    1. Jialiang Peng, Bassem Abd El-Atty, Hany S. Khalifa, Ahmed A. Abd El-Latif "Image watermarking algorithm based on quaternion and chaotic Lorenz system" The 11th International Conference on Digital Image Processing.


    1. Bassem Abd-El-Atty, Mohamed Amin, Ahmed A. Abd El-Latif, Hassan Ugail, Irfan Mehmood " An efficient cryptosystems approach based on Logistic-Chebyshev map " In 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), pp. 1-6. IEEE, 2019.

    2. Ahmad Alanezi, Bassem Abd-El-Atty, Hoshang Kolivand, and Ahmed A. Abd El-Latif. "Quantum based encryption approach for secure images." In 2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA), pp. 176-181. IEEE, 2021.

    3. Shagufta Arfin, Hesham Mohammad Tarique, Sarfaraz Masood, Ahmed A. Abd El-latif, "A Vision Transformer Model for Violence Detection from Real-Time Videos" The 5th International Conference on Future Networks & Distributed Systems, December 2021, Pages 834–840 https://doi.org/10.1145/3508072.3512288 ( Link)