Skip to main content

Research Repository

Advanced Search

Outputs (6)

A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation (2017)
Journal Article
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017). A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation. Journal of Intelligent and Fuzzy Systems, 33(6), 3753-3765. https://doi.org/10.3233/JIF

Internet is used as the main source of communication throughout the world. However due to public nature of internet data are always exposed to different types of attacks. To address this issue many researchers are working in this area and proposing d... Read More about A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation.

A new technique for designing 8 × 8 substitution box for image encryption applications (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017). A new technique for designing 8 × 8 substitution box for image encryption applications. In 2017 9th Computer Science and Electronic Engineering (CEEC). https://doi.org/1

To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stag... Read More about A new technique for designing 8 × 8 substitution box for image encryption applications.

A novel substitution box for encryption based on Lorenz equations (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017). A novel substitution box for encryption based on Lorenz equations. In 2017 International Conference on Circuits, System and Simulation (ICCSS). https://doi.org/10.1109/cirsyssim.2017.8

Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms is mainly Substitution Box (S-Box). In block ciphers, the relationship bet... Read More about A novel substitution box for encryption based on Lorenz equations.

Energy demand prediction through novel random neural network predictor for large non-domestic buildings (2017)
Presentation / Conference Contribution
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A., & Phillipson, M. (2017). Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In 2017 Annual IEEE International Systems Conference (SysCon)

Buildings are among the largest consumers of energy in the world. In developed countries, buildings currently consumes 40% of the total energy and 51% of total electricity consumption. Energy prediction is a key factor in reducing energy wastage. Thi... Read More about Energy demand prediction through novel random neural network predictor for large non-domestic buildings.

Secure speech communication algorithm via DCT and TD-ERCS chaotic map (2017)
Presentation / Conference Contribution
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017). Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE). https://doi.org/10.1109/ic

Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have an essential privacy for speech transmission in the telephone networks, rad... Read More about Secure speech communication algorithm via DCT and TD-ERCS chaotic map.

A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation (2017)
Journal Article
Ahmad, J., Khan, M. A., Ahmed, F., & Khan, J. S. (2018). A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Computing and Applications, 30(12), 3847-3857. https://doi.org/10.1007/s00521-017-2970-3

Content protection is considered as an important issue in today’s world. Therefore, encryption of such contents is a challenging task for researchers. They are focusing on protection of valuable data such as image, video, and audio against different... Read More about A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation.