Jan Sher Khan

Jan Sher Khan
  • MS
  • Master's Student at Gaziantep University

About

34
Publications
11,273
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,262
Citations
Introduction
Current institution
Gaziantep University
Current position
  • Master's Student
Additional affiliations
September 2018 - October 2018
University of Glasgow
Position
  • Research Internee
Description
  • During my stay at the University of Glasgow, I was integrated in Communication, Sensing and Imaging research group and had the opportunity to interact with our postgraduate students, researchers and other academics in the group and the department.
October 2016 - present
Gaziantep University
Position
  • Master's Student
September 2014 - July 2015
Istanbul Technical University
Position
  • Student
Description
  • As an Exchange Student, I completed my fourth-year undergraduate studies in Electrical Engineering Department of Istanbul Technical University (ITU), Turkey.

Publications

Publications (34)
Article
Full-text available
With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are stored and shared over global networks, the probability for information leakage and illegal modifications to the digital content is at high risk. ese digital images are transferred using the network bandwidth; therefore,...
Article
Full-text available
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. {Benefiting from inherent properties} such as ergodicity and key-sensitivity; this can potentially improve non-linearity in encrypted data. This paper introduces a hybrid scheme that encrypt color images using multiple chaotic maps such as the two-di...
Article
Full-text available
Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information. However, traditional watermarking schemes are either slow or less secure. In this paper, a dynamic S...
Article
Out of various cryptographic attacks, Chosen-Plaintext Attack (CPA) is one of the most powerful and widely used attack on encrypted images. In order to efficiently resist such a strong attack, a novel chaos and compressive sensing based image encryption algorithm is presented in this work. Firstly, the original plaintext image is compressed via Ort...
Conference Paper
A dual-band high-performance circular patch microstrip antenna for future 5th generation (5G) of mobile communication is proposed. The designed antenna has a ring-shaped Defected Ground Structure (DGS) in the ground plane. The proposed antenna operates at 28GHz (27.68GHz - 28.55GHz, 3.10%), which is a proposed frequency for 5G. A ring-shaped Defect...
Conference Paper
Full-text available
Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing image encryption scheme using the Secure Hash Algorithm (SHA-512), Discrete Cosine Transform (DCT), orthogonal matrix and discrete Chirikov map-based random permutation. DCT is applied on a plaintex...
Article
Full-text available
Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this article, a new form of encryption is proposed based on keys derived from Deoxyribonucleic Acid (DNA) and plaintext image. The proposed scheme results in chaotic visual selective e...
Chapter
Full-text available
Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson’s disease (PD). FOG is the result of neural control disorder and motor impairments, which severely impedes forward locomotion. This paper presents the exploitation of 5G spectrum operating at 4.8 GHz (a potential Chinese frequency band for Internet of Th...
Chapter
Full-text available
Prospective studies using longitudinal patient data can be used to help to predict responsiveness to Growth Hormone (GH) therapy and assess any suspected risks. In this paper, a novel Clinical Decision Support System (CDSS) is developed to predict growth (in terms of height) in children with Growth Hormone Deficiency (GHD) just before the start of...
Conference Paper
Full-text available
Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptoms in Parkinson's disease (PD). FOG is the result of neural control disorder and motor impairments, which severely impedes forward locomotion. This paper presents the exploitation of 5G spectrum operating at 4.8 GHz (a potential Chinese frequency band for the Internet...
Article
Full-text available
With the exponential growth of Internet technologies, digital information exchanged over the Internet is also significantly increased. In order to ensure the security of multimedia contents over the open natured Internet, data should be encrypted. In this paper, the quantum chaotic map is utilized for random vectors generation. Initial conditions f...
Article
Full-text available
Due to social networks, demand for sharing multimedia data is significantly increased in last decade. However, lower complexity and frequent security breaches on public network such as Internet make it easy for eavesdroppers to approach the actual contents without any hurdle. Many encryption algorithms has been developed by researchers to increase...
Chapter
Full-text available
Transmission of images over the Internet is exponentially increased in the last decade. However, Internet is considered as an insecure channel and hence may cause serious privacy issues. To overcome such privacy concerns, researchers are trying to secure image data from eavesdroppers through a method known as encryption. The final output of most tr...
Article
Full-text available
Content protection is considered as an important issue in today’s world. Therefore, encryption of such contents is a challenging task for researchers. They are focusing on protection of valuable data such as image, video, and audio against different attacks from eavesdroppers. In this paper, we proposed an enhanced version of Fawad et al.’s scheme...
Conference Paper
Full-text available
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdroppers is one of the most challenging and significant research areas. Due to various attacks from eavesdroppers, medical images need to be store and send in the encrypted format. I...
Conference Paper
Full-text available
In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always vulnerable to different kind of attacks. In order to address such issues, cryptographers are proposi...
Article
Full-text available
World has become a global village after introduction of social media and social networks. However, it extensively increased the demand for network resources, particularly multimedia traffic like images, videos and audio. The medium for this extensive traffic is always public networks such as internet or cellular networks. But the open nature of suc...
Article
Full-text available
With the evolution of technologies, the size of an image data has been significantly increased. However, traditional image encryption schemes cannot handle the emerging problems in big data such as noise toleration and compression. In order to meet today’s challenges, we propose a new image encryption scheme based on chaotic maps and orthogonal mat...
Article
Full-text available
Internet is used as the main source of communication throughout the world. However due to public nature of internet data are always exposed to different types of attacks. To address this issue many researchers are working in this area and proposing data encryption techniques. Recently a new substitution box has been proposed for image encryption us...
Conference Paper
Full-text available
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have an essential privacy for speech transmission in the telephone networks, radio communication and in the emerging cellular mobile radio systems. In this paper, we present a high...
Article
Full-text available
In this article, we proposed a new scheme to encrypt highly autocorrelated image pixel data. In existing literature, single substitution was used to break autocorrelation in images. To get better results, instead of single substitution box, some researchers are minimizing the autocorrelation via utilizing multiple substitution boxes. However, we fo...
Article
Full-text available
Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this paper, a new encryption method based on dynamic substitution boxes is proposed via using two chaotic maps. To break the correlation in an original image, pixels values of the o...
Conference Paper
Full-text available
Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern communication systems. Encryption is one of the preeminent ways to guarantee security in many real time applications. In this paper, confusion and diffusion phenomenon is presente...
Conference Paper
Full-text available
Due to easy and simple implementation, normally single 1-D chaotic maps like logistic and sine maps are employed in multimedia data encryption. However, data encrypted through a single chaotic map does not provide better security in terms of resistance against various attacks. In this paper, 2D Henon chaotic map and skew tent map are deployed...

Network

Cited By