default search action
Mohsen A. M. El-Bendary
Person information
- affiliation: Helwan University, Department of Electronics Technology, Cairo, Egypt
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Osama S. Faragallah, M. Farouk, Hala S. El-sayed, Mohsen A. M. El-Bendary:
Speech cryptography algorithms: utilizing frequency and time domain techniques merging. J. Ambient Intell. Humaniz. Comput. 15(10): 3617-3649 (2024) - 2023
- [j24]Mohsen A. M. El-Bendary, Sabry S. Nassar:
Different attacks presence considerations: analyzing the simple and efficient self-marked algorithm performance for highly-sensitive audio signals contents verification. Int. J. Speech Technol. 26(on): 379-394 (2023) - [j23]Mohsen A. M. El-Bendary, Osama S. Faragallah, Sabry S. Nassar:
An efficient hidden marking approach for forensic and contents verification of digital images. Multim. Tools Appl. 82(17): 25527-25558 (2023) - [j22]Mostafa A. R. Eltokhy, Mohamed Abdel-Hady, Ayman Haggag, Mohsen A. M. El-Bendary, Hisham Ali, Tarek Hosny:
Audio SIMO system based on visible light communication using cavity LEDs. Multim. Tools Appl. 82(30): 46371-46385 (2023) - [j21]Mohsen A. M. El-Bendary, Ayman Haggag:
Optimum Piezo-Electric Based Energy Harvesting for Low-Power Wireless Networks with Power Complexity Considerations. Wirel. Pers. Commun. 133(4): 2355-2377 (2023) - 2022
- [j20]Mohsen A. M. El-Bendary, M. Ayman:
Efficient Multiple 4-Bit ALU Designs for Fast Computation and Reduced Area. Circuits Syst. Signal Process. 41(8): 4671-4691 (2022) - [j19]Hany Kasban, Sherief Hashima, Sabry S. Nassar, Ehab Mahmoud Mohamed, Mohsen A. M. El-Bendary:
Performance enhancing of MIMO-OFDM system utilizing different interleaving techniques with rate-less fountain raptor code. IET Commun. 16(20): 2479-2491 (2022) - [j18]Sabry S. Nassar, Mohsen A. M. El-Bendary:
Confidentiality considerations: multimedia signals transmission over different wireless channels utilized efficient secured model. Multim. Tools Appl. 81(18): 25707-25744 (2022) - 2021
- [j17]Sabry S. Nassar, Osama S. Faragallah, Mohsen A. M. El-Bendary:
Reliable Mark-Embedded Algorithm for Verifying Archived/Encrypted Image Contents in Presence Different Attacks with FEC Utilizing Consideration. Wirel. Pers. Commun. 119(1): 37-61 (2021) - 2020
- [j16]Mohsen A. M. Mohamed Kaseem El-Bendary, Hany Kasban, Ayman Haggag, Mostafa A. R. Eltokhy:
Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security. Multim. Tools Appl. 79(33-34): 24507-24535 (2020)
2010 – 2019
- 2019
- [j15]Mohsen A. M. El-Bendary, Atef E. Abou-El-azm:
Complexity considerations: efficient image transmission over mobile communications channels. Multim. Tools Appl. 78(12): 16633-16664 (2019) - 2017
- [j14]Mohsen A. M. El-Bendary:
FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multim. Tools Appl. 76(24): 26463-26501 (2017) - [j13]Hany Kasban, Mohsen A. M. Mohamed Kaseem El-Bendary:
Performance Improvement of Digital Image Transmission over Mobile WiMAX Networks. Wirel. Pers. Commun. 94(3): 1087-1103 (2017) - [j12]Nora M. El-Gohary, Mohsen A. M. El-Bendary, Fathi E. Abd El-Samie, Mohamed M. Fouad:
Utilization of Raptor Codes for OFDM-System Performance Enhancing. Wirel. Pers. Commun. 96(4): 5555-5585 (2017) - 2016
- [j11]Sabry S. Nassar, Nabil M. Ayad, Hamdy M. Kelash, Hala S. El-sayed, Mohsen A. M. El-Bendary, Fathi E. Abd El-Samie, Osama S. Faragallah:
Efficient audio integrity verification algorithm using discrete cosine transform. Int. J. Speech Technol. 19(1): 1-8 (2016) - [j10]Sabry S. Nassar, Nabil M. Ayad, Hamdy M. Kelash, Hala S. El-sayed, Mohsen A. M. El-Bendary, Fathi E. Abd El-Samie, Osama S. Faragallah:
Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels. Wirel. Pers. Commun. 88(3): 479-491 (2016) - [j9]Sabry S. Nassar, Nabil M. Ayad, Hamdy M. Kelash, Hala S. El-sayed, Mohsen A. M. El-Bendary, Fathi E. Abd El-Samie, Osama S. Faragallah:
Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering. Wirel. Pers. Commun. 91(3): 1023-1049 (2016) - 2015
- [b1]Mohsen A. M. El-Bendary:
Developing Security Tools of WSN and WBAN Networks Applications. Lecture Notes in Electrical Engineering 316, Springer 2015, ISBN 978-4-431-55068-6, pp. 1-212 - [j8]Naglaa F. Soliman, Emad S. Hassan, Abdelhamid A. Shaalan, Mohammed M. Fouad, Said Esmail El-Khamy, Yasser Attia Albagory, Mohsen A. M. El-Bendary, Waleed Al-Hanafy, El-Sayed M. El-Rabaie, Moawad I. Dessouky, Sami A. El-Dolil, Saleh A. Alshebeili, Fathi E. Abd El-Samie:
Efficient Image Communication in PAPR Distortion Cases. Wirel. Pers. Commun. 83(4): 2773-2834 (2015) - [j7]Ibrahim M. Eldokany, El-Sayed M. El-Rabaie, Said M. Elhalafawy, Mohamed A. Zein Eldin, Mai H. Shahieen, Naglaa F. Soliman, Mohsen A. M. El-Bendary, Mohammed Abd El-Naby, Faisal S. Al-Kamali, Ibrahim F. Elashry, Fathi E. Abd El-Samie:
Efficient Transmission of Encrypted Images with OFDM in the Presence of Carrier Frequency Offset. Wirel. Pers. Commun. 84(1): 475-521 (2015) - 2014
- [j6]Ali A. Khalil, Mustafa M. Abd-Elnaby, Elsayed M. Saad, Azzam Y. Al-nahari, Nayel S. Al-Zubi, Mohsen A. M. El-Bendary, Fathi E. Abd El-Samie:
Efficient speaker identification from speech transmitted over Bluetooth networks. Int. J. Speech Technol. 17(4): 409-416 (2014) - [j5]Naglaa F. Soliman, Yasser Attia Albagory, Mohsen A. M. El-Bendary, Waleed Al-Hanafy, El-Sayed M. El-Rabaie, Saleh A. Alshebeili, Fathi E. Abd El-Samie:
Chaotic Interleaving for Robust Image Transmission with LDPC Coded OFDM. Wirel. Pers. Commun. 79(3): 2141-2154 (2014) - 2013
- [j4]Mohsen A. M. El-Bendary, Atef E. Abou-El-azm, Nawal A. El-Fishawy, Farid Shawki, Mostafa Refai El-Tokhy, Fathi E. Abd El-Samie, Hassan B. Kazemian:
Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Wirel. Networks 19(4): 517-532 (2013) - 2012
- [j3]Mohsen A. M. El-Bendary, Atef E. Abou-El-azm, Nawal A. El-Fishawy, Farid Shawki, Fathi E. Abd El-Samie, Mostafa Refai El-Tokhy, Hassan B. Kazemian:
Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP J. Audio Speech Music. Process. 2012: 4 (2012) - 2011
- [j2]Waleed Al-Nuaimy, Mohsen A. M. El-Bendary, Amira Shafik, Farid Shawki, Atef E. Abou-El-azm, Nawal A. El-Fishawy, Said M. Elhalafawy, Salaheldin M. Diab, Bassiuny M. Sallam, Fathi E. Abd El-Samie, Hassan B. Kazemian:
An SVD audio watermarking approach using chaotic encrypted images. Digit. Signal Process. 21(6): 764-779 (2011) - [j1]Mohsen A. M. El-Bendary, Atef E. Abou-El-azm, Nawal A. El-Fishawy, Farid Shawki, Mostafa Refai El-Tokhy, Fathi E. Abd El-Samie, Hassan B. Kazemian:
Enhancing the Image Transmission over Wireless Networks through a Novel Interleaver. KSII Trans. Internet Inf. Syst. 5(9): 1528-1543 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint