Multimedia Security Using Chaotic Maps: Principles and Methodologies

  • Khalid M. Hosny

Part of the Studies in Computational Intelligence book series (SCI, volume 884)

Table of contents

  1. Front Matter
    Pages i-xiii
  2. Manish Kumar, Amogh Saxena, Sai Satvik Vuppala
    Pages 1-26
  3. Sara T. Kamal, Mohamed M. Darwish, Khalid M. Hosny
    Pages 27-51
  4. Hang Chen, Zhengjun Liu, Feifei Liu, Camel Tanougast, Walter Blondel
    Pages 53-79
  5. Hamsa A. Abdullah, Hikmat N. Abdullah
    Pages 81-109
  6. M. A. Murillo-Escobar, M. O. Meranza-Castillón, R. M. López-Gutiérrez, C. Cruz-Hernández
    Pages 111-136
  7. Mohamed M. Darwish, Khalid M. Hosny, Sara T. Kamal
    Pages 137-158
  8. A. M. Yousef, Amr Elsonbaty, Esam A. A. Hagras, A. A. Elsadany
    Pages 159-185
  9. Ahmed J. Abd El-Maksoud, Ayman A. Abd El-Kader, Bahy G. Hassan, Nader G. Rihan, Mohamed F. Tolba, Lobna A. Said et al.
    Pages 199-229
  10. Hamsa A. Abdullah, Hikmat N. Abdullah
    Pages 231-263

About this book


This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia security, and information security, as well as for professionals in the IT industry.


Multimedia Security Chaotic Maps Computational Intelligence Hybrid Chaotic Systems Intelligent Systems

Editors and affiliations

  • Khalid M. Hosny
    • 1
  1. 1.Department of Information Technology, Faculty of Computers and InformaticsZagazig UniversityZagazigEgypt

Bibliographic information