Research explorer tool

Date


School

People

Download Available

16 results

DNA Sequence Based Medical Image Encryption Scheme

Conference Proceeding
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018)
DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2018.8674221
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdropper...

Intertwining and NCA Maps Based New Image Encryption Scheme

Conference Proceeding
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018)
Intertwining and NCA Maps Based New Image Encryption Scheme. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE)https://doi.org/10.1109/iccecome.2018.8658919
In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common no...

A new technique for designing 8 × 8 substitution box for image encryption applications

Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017)
A new technique for designing 8 × 8 substitution box for image encryption applications. In 2017 9th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2017.8101591
To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secur...

A novel substitution box for encryption based on Lorenz equations

Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017)
A novel substitution box for encryption based on Lorenz equations. In 2017 International Conference on Circuits, System and Simulation (ICCSS)https://doi.org/10.1109/cirsyssim.2017.8023176
Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms...

Secure speech communication algorithm via DCT and TD-ERCS chaotic map

Conference Proceeding
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017)
Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)https://doi.org/10.1109/iceee2.2017.7935827
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have ...

Energy demand prediction through novel random neural network predictor for large non-domestic buildings

Conference Proceeding
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A., & Phillipson, M. (2017)
Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In 2017 Annual IEEE International Systems Conference (SysCon)https://doi.org/10.1109/syscon.2017.7934803
Buildings are among the largest consumers of energy in the world. In developed countries, buildings currently consumes 40% of the total energy and 51% of total electricity con...

An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box

Journal Article
Khan, M. A., Ahmad, J., Javaid, Q., & Saqib, N. A. (2017)
An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531-540. https://doi.org/10.1080/09500340.2016.1246680
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to...

TD-ERCS map-based confusion and diffusion of autocorrelated data

Journal Article
Khan, J. S., Ahmad, J., & Khan, M. A. (2017)
TD-ERCS map-based confusion and diffusion of autocorrelated data. Nonlinear Dynamics, 87(1), 93-107. https://doi.org/10.1007/s11071-016-3028-2
In this article, we proposed a new scheme to encrypt highly autocorrelated image pixel data. In existing literature, single substitution was used to break autocorrelation in i...

A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices

Journal Article
Ahmad, J., Khan, M. A., Hwang, S. O., & Khan, J. S. (2016)
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications, 28(S1), 953-967. https://doi.org/10.1007/s00521-016-2405-6
With the evolution of technologies, the size of an image data has been significantly increased. However, traditional image encryption schemes cannot handle the emerging proble...

A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps

Journal Article
Rehman, A. U., Khan, J. S., Ahmad, J., & Hwang, S. O. (2016)
A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps. 3D research, 7(1), https://doi.org/10.1007/s13319-016-0084-9
Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this p...