
Jan Sher Khan- MS
- Master's Student at Gaziantep University
Jan Sher Khan
- MS
- Master's Student at Gaziantep University
About
34
Publications
11,273
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,262
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
September 2018 - October 2018
October 2016 - present
Publications
Publications (34)
With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are stored and shared over global networks, the probability for information leakage and illegal modifications to the digital content is at high risk. ese digital images are transferred using the network bandwidth; therefore,...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. {Benefiting from inherent properties} such as ergodicity and key-sensitivity; this can potentially improve non-linearity in encrypted data. This paper introduces a hybrid scheme that encrypt color images using multiple chaotic maps such as the two-di...
Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information. However, traditional watermarking schemes are either slow or less secure. In this paper, a dynamic S...
Out of various cryptographic attacks, Chosen-Plaintext Attack (CPA) is one of the most powerful and widely used attack on encrypted images. In order to efficiently resist such a strong attack, a novel chaos and compressive sensing based image encryption algorithm is presented in this work. Firstly, the original plaintext image is compressed via Ort...
A dual-band high-performance circular patch microstrip antenna for future 5th generation (5G) of mobile communication is proposed. The designed antenna has a ring-shaped Defected Ground Structure (DGS) in the ground plane. The proposed antenna operates at 28GHz (27.68GHz - 28.55GHz, 3.10%), which is a proposed frequency for 5G. A ring-shaped Defect...
Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing image encryption scheme using the Secure Hash Algorithm (SHA-512), Discrete Cosine Transform (DCT), orthogonal matrix and discrete Chirikov map-based random permutation. DCT is applied on a plaintex...
Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this article, a new form of encryption is proposed based on keys derived from Deoxyribonucleic Acid (DNA) and plaintext image. The proposed scheme results in chaotic visual selective e...
Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson’s disease (PD). FOG is the result of neural control disorder and motor impairments, which severely impedes forward locomotion. This paper presents the exploitation of 5G spectrum operating at 4.8 GHz (a potential Chinese frequency band for Internet of Th...
Prospective studies using longitudinal patient data can be used to help to predict responsiveness to Growth Hormone (GH) therapy and assess any suspected risks. In this paper, a novel Clinical Decision Support System (CDSS) is developed to predict growth (in terms of height) in children with Growth Hormone Deficiency (GHD) just before the start of...
Freezing of gait (FOG) is one of the most incapacitating and
disconcerting symptoms in Parkinson's disease (PD). FOG is the result of
neural control disorder and motor impairments, which severely impedes
forward locomotion. This paper presents the exploitation of 5G spectrum
operating at 4.8 GHz (a potential Chinese frequency band for the Internet...
With the exponential growth of Internet technologies, digital information exchanged over the Internet is also significantly increased. In order to ensure the security of multimedia contents over the open natured Internet, data should be encrypted. In this paper, the quantum chaotic map is utilized for random vectors generation. Initial conditions f...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade. However, lower complexity and frequent security breaches on public network such as Internet make it easy for eavesdroppers to approach the actual contents without any hurdle. Many encryption algorithms has been developed by researchers to increase...
Transmission of images over the Internet is exponentially increased in the last decade. However, Internet is considered as an insecure channel and hence may cause serious privacy issues. To overcome such privacy concerns, researchers are trying to secure image data from eavesdroppers through a method known as encryption. The final output of most tr...
Content protection is considered as an important issue in today’s world. Therefore, encryption of such contents is a challenging task for researchers. They are focusing on protection of valuable data such as image, video, and audio against different attacks from eavesdroppers. In this paper, we proposed an enhanced version of Fawad et al.’s scheme...
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdroppers is one of the most challenging and significant research areas. Due to various attacks from eavesdroppers, medical images need to be store and send in the encrypted format. I...
In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always vulnerable to different kind of attacks. In order to address such issues, cryptographers are proposi...
World has become a global village after introduction of social media and social networks. However, it extensively increased the demand for network resources, particularly multimedia traffic like images, videos and audio. The medium for this extensive traffic is always public networks such as internet or cellular networks. But the open nature of suc...
With the evolution of technologies, the size of an image data has been significantly increased. However, traditional image encryption schemes cannot handle the emerging problems in big data such as noise toleration and compression. In order to meet today’s challenges, we propose a new image encryption scheme based on chaotic maps and orthogonal mat...
Internet is used as the main source of communication throughout the world. However due to public nature of internet data are always exposed to different types of attacks. To address this issue many researchers are working in this area and proposing data encryption techniques. Recently a new substitution box has been proposed for image encryption us...
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have an essential privacy for speech transmission in the telephone networks, radio communication and in the emerging cellular mobile radio systems. In this paper, we present a high...
In this article, we proposed a new scheme to encrypt highly autocorrelated image pixel data. In existing literature, single substitution was used to break autocorrelation in images. To get better results, instead of single substitution box, some researchers are minimizing the autocorrelation via utilizing multiple substitution boxes. However, we fo...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this paper, a new encryption method based on dynamic substitution boxes is proposed via using two chaotic maps. To break the correlation in an original image, pixels values of the o...
Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern communication systems. Encryption is one of the preeminent ways to guarantee security in many real time applications. In this paper, confusion and diffusion phenomenon is presente...
Due to easy and simple implementation, normally
single 1-D chaotic maps like logistic and sine maps are employed
in multimedia data encryption. However, data encrypted through
a single chaotic map does not provide better security in terms of
resistance against various attacks. In this paper, 2D Henon
chaotic map and skew tent map are deployed...