Skip to main content

Research Repository

Advanced Search

All Outputs (147)

A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps (2016)
Journal Article
Rehman, A. U., Khan, J. S., Ahmad, J., & Hwang, S. O. (2016). A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps. 3D research, 7(1), https://doi.org/10.1007/s13319-016-0084-9

Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this paper, a new encryption method based on dynamic substitution boxes is propos... Read More about A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps.

A new chaos-based secure image encryption scheme using multiple substitution boxes (2015)
Presentation / Conference Contribution
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015). A new chaos-based secure image encryption scheme using multiple substitution boxes. In 2015 Conference on Information Assurance and Cyber Security (CIACS). https://doi.org/10.1109/ciacs.2015.7395

Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern communication systems. Encryption is one of the pre-eminent ways to guarantee s... Read More about A new chaos-based secure image encryption scheme using multiple substitution boxes.

A secure image encryption scheme based on chaotic maps and affine transformation (2015)
Journal Article
Ahmad, J., & Hwang, S. O. (2016). A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951-13976. https://doi.org/10.1007/s11042-015-2973-y

Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. However, many encryption schemes do not fulfil the minimum key space requirement,... Read More about A secure image encryption scheme based on chaotic maps and affine transformation.

Chaos-based diffusion for highly autocorrelated data in encryption algorithms (2015)
Journal Article
Ahmad, J., & Hwang, S. O. (2015). Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics, 82(4), 1839-1850. https://doi.org/10.1007/s11071-015-2281-0

In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symbol. To reduce this type of autocorrelation in data, chaos has been extensively applied over the last decade. By using chaotic maps, a single substitut... Read More about Chaos-based diffusion for highly autocorrelated data in encryption algorithms.

An efficient image encryption scheme based on: Henon map, skew tent map and S-Box (2015)
Presentation / Conference Contribution
Khan, J., Ahmad, J., & Hwang, S. O. (2015). An efficient image encryption scheme based on: Henon map, skew tent map and S-Box. In 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO). https://doi.org/10.1109/ICMSAO

Due to easy and simple implementation, normally single 1-D chaotic maps like logistic and sine maps are employed in multimedia data encryption. However, data encrypted through a single chaotic map does not provide better security in terms of resistan... Read More about An efficient image encryption scheme based on: Henon map, skew tent map and S-Box.

An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes (2015)
Journal Article
Ahmad, J., Hwang, S. O., & Ali, A. (2015). An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes. Wireless Personal Communications, 84(2), 901-918. https://doi.org/10.1007/s11277-015-2667-9

During last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been significantly evolved. The provision of security to store and transmit data with co... Read More about An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes.

Comparative analysis of chaotic and non-chaotic image encryption schemes (2014)
Presentation / Conference Contribution
Younas, M. B., & Ahmad, J. (2014). Comparative analysis of chaotic and non-chaotic image encryption schemes. In 2014 International Conference on Emerging Technologies (ICET). https://doi.org/10.1109/icet.2014.7021021

In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Security is required for storage and transmission of digital images to avoid fr... Read More about Comparative analysis of chaotic and non-chaotic image encryption schemes.