Date


School

Research Areas

People

Download Available

18 results

A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices

Journal Article
Ahmad, J., Khan, M. A., Hwang, S. O., & Khan, J. S. (2016)
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications, 28(S1), 953-967. https://doi.org/10.1007/s00521-016-2405-6
With the evolution of technologies, the size of an image data has been significantly increased. However, traditional image encryption schemes cannot handle the emerging proble...

A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps

Journal Article
Rehman, A. U., Khan, J. S., Ahmad, J., & Hwang, S. O. (2016)
A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps. 3D research, 7(1), https://doi.org/10.1007/s13319-016-0084-9
Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this p...

A new chaos-based secure image encryption scheme using multiple substitution boxes

Conference Proceeding
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015)
A new chaos-based secure image encryption scheme using multiple substitution boxes. In 2015 Conference on Information Assurance and Cyber Security (CIACS)https://doi.org/10.1109/ciacs.2015.7395561
Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern comm...

A secure image encryption scheme based on chaotic maps and affine transformation

Journal Article
Ahmad, J., & Hwang, S. O. (2016)
A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951-13976. https://doi.org/10.1007/s11042-015-2973-y
Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. Howeve...

Chaos-based diffusion for highly autocorrelated data in encryption algorithms

Journal Article
Ahmad, J., & Hwang, S. O. (2015)
Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics, 82(4), 1839-1850. https://doi.org/10.1007/s11071-015-2281-0
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symbol. To reduce this type of autocorrelation in data, chaos has been extensiv...

An efficient image encryption scheme based on: Henon map, skew tent map and S-Box

Conference Proceeding
Khan, J., Ahmad, J., & Hwang, S. O. (2015)
An efficient image encryption scheme based on: Henon map, skew tent map and S-Box. In 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO)https://doi.org/10.1109/ICMSAO.2015.7152261
Due to easy and simple implementation, normally single 1-D chaotic maps like logistic and sine maps are employed in multimedia data encryption. However, data encrypted through...

An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes

Journal Article
Ahmad, J., Hwang, S. O., & Ali, A. (2015)
An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes. Wireless Personal Communications, 84(2), 901-918. https://doi.org/10.1007/s11277-015-2667-9
During last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been signific...

Comparative analysis of chaotic and non-chaotic image encryption schemes

Conference Proceeding
Younas, M. B., & Ahmad, J. (2014)
Comparative analysis of chaotic and non-chaotic image encryption schemes. In 2014 International Conference on Emerging Technologies (ICET)https://doi.org/10.1109/icet.2014.7021021
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Secu...