Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain

A Shafique, J Ahmed, MU Rehman, MM Hazzazi - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, a noise-resistant image encryption scheme is proposed. We have used a cubic-logistic
map, Discrete Wavelet Transform (DWT), and bit-plane extraction method to encrypt …

Construction of s-boxes using different maps over elliptic curves for image encryption

M Ramzan, T Shah, MM Hazzazi, A Aljaedi… - IEEE …, 2021 - ieeexplore.ieee.org
In this article, we present an encryption technique that can encrypt any digital data. The
proposed scheme basically depends on a substitution-permutation network. Two separate …

[HTML][HTML] A novel, efficient, and secure anomaly detection technique using DWU-ODBN for IoT-enabled multimedia communication systems

…, M Jeyaselvi, L Krishnasamy, MM Hazzazi… - … and Mobile Computing, 2021 - hindawi.com
The Internet of Things (IoT) is enhancing our lives in a variety of structures, which consists of
smarter cities, agribusiness, and e-healthcare, among others. Even though the Internet of …

Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map

N Munir, M Khan, SS Jamal, MM Hazzazi… - … and Computers in …, 2021 - Elsevier
Recently a hybrid secure image encryption scheme based on Julia set and three-dimensional
Lorenz chaotic system was suggested. The offered scheme was based on the …

Region of interest-based medical image encryption technique based on chaotic S-boxes

SS Jamal, MM Hazzazi, MF Khan, Z Bassfar… - Expert Systems with …, 2024 - Elsevier
Block cipher has been one of the most reliable options by which data security is achieved.
The strength of block cipher against various attacks is purely dependent on its confusion …

Cryptanalysis of internet of health things encryption scheme based on chaotic maps

N Munir, M Khan, MM Hazzazi, A Aljaedi… - IEEE …, 2021 - ieeexplore.ieee.org
Many encryption algorithms are designed to decrease the probability of cyberattacks by
assuring data security as well as system and participant authentication. However, in the …

A novel scheme of image encryption based on elliptic curves isomorphism and substitution boxes

…, SS Jamal, T Shah, D Shah, MM Hazzazi - IEEE Access, 2021 - ieeexplore.ieee.org
In this manuscript, we propose an image encryption technique by using isomorphic elliptic
curves which are proved to be effective against side-channel attacks and have efficient key …

A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes

LS Khan, MM Hazzazi, M Khan, SS Jamal - Chinese Journal of Physics, 2021 - Elsevier
Symmetric encryption is appraised as one of the key ways in which end-to-end data transfer
security is guaranteed. To inject confusion in the substitution phase of the modern block …

[HTML][HTML] Efficient and secure image encryption using key substitution process with discrete wavelet transform

…, A Shafique, KH Khan, MM Hazzazi - Journal of King Saud …, 2023 - Elsevier
Over the past few years, there has been a rise in the utilization of chaotic encryption algorithms
for securing images. The majority of chaos-based encryption algorithms adhere to the …

An efficient image encryption scheme based on double affine substitution box and chaotic system

M Khan, SS Jamal, MM Hazzazi, KM Ali, I Hussain… - Integration, 2021 - Elsevier
Privacy of information is one of the most important and unavoidable issues in our digitally
advance era. A huge amount of information transmitted over different servers and networking …