default search action
Musheer Ahmad 0002
Person information
- affiliation (since 2011): Jamia Millia Islamia, Department of Computer Engineering, New Delhi, India
- affiliation (PhD): Jamia Millia Islamia, Department of Computer Engineering, New Delhi, India
Other persons with the same name
- Musheer Ahmad 0001 — Jamia Millia Islamia, Department of Applied Sciences and Humanities, New Delhi, India (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j74]Abdul Razaq, Louai Maghrabi, Musheer Ahmad, Farrah Aslam, Wei Feng:
Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine. IEEE Access 12: 7584-7608 (2024) - [j73]Muhammad Tanveer, Ahmed A. Abd El-Latif, Abd Ullah Khan, Musheer Ahmad, Abdelhamied A. Ateya:
LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things. IEEE Access 12: 31771-31787 (2024) - [j72]Faisal Mohammed Alotaibi, Louai Maghrabi, Muhammad Tanveer, Musheer Ahmad, Qamar Hamid Naith:
RAP-MEC: Robust Authentication Protocol for the Mobile Edge Computing Services. IEEE Access 12: 109673-109689 (2024) - [j71]Vincent Omollo Nyangaresi, Eesa Alsolami, Musheer Ahmad:
Trust-Enabled Energy Efficient Protocol for Secure Remote Sensing in Supply Chain Management. IEEE Access 12: 113553-113564 (2024) - [j70]Wei Feng, Jing Zhang, Yao Chen, Zhentao Qin, Yushu Zhang, Musheer Ahmad, Marcin Wozniak:
Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 246: 123190 (2024) - [j69]Sarfaraz Masood, Rafiuddin Khan, Ahmed A. Abd El-Latif, Musheer Ahmad:
An FCN-LSTM model for neurological status detection from non-invasive multivariate sensor data. Neural Comput. Appl. 36(1): 77-93 (2024) - [j68]Munzir Hubiba Bashir, Musheer Ahmad, Danish Raza Rizvi, Ahmed A. Abd El-Latif:
Efficient CNN-based disaster events classification using UAV-aided images for emergency response application. Neural Comput. Appl. 36(18): 10599-10612 (2024) - 2023
- [j67]Sura Mahmood Abdullah, Thekra Abbas, Munzir Hubiba Bashir, Ishfaq Ahmad Khaja, Musheer Ahmad, Naglaa F. Soliman, Walid El-Shafai:
Deep Transfer Learning Based Parkinson's Disease Detection Using Optimized Feature Selection. IEEE Access 11: 3511-3524 (2023) - [j66]Salwa M. Serag Eldin, Ahmed A. Abd El-Latif, Samia Allaoua Chelloug, Musheer Ahmad, Ahmed H. Eldeeb, Tamer Omar Mohamed Diab, Wageda Ibrahim El Sobky, Hany Nasry Zaky:
Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences. IEEE Access 11: 101694-101709 (2023) - [j65]Amjad Hussain Zahid, Hafiz Ali Mansoor Elahi, Musheer Ahmad, Louai Maghrabi, Ramy Said Agieb Said:
Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity. IEEE Access 11: 139745-139758 (2023) - [j64]Abd Ullah Khan, Muhammad Tanveer, Hyundong Shin, Musheer Ahmad, Ammar Muthanna, Abdukodir Khakimov, Fahad Alblehai, Ahmed A. Abd El-Latif:
Toward Spectrum Efficiency and Reliability for Heterogeneous Users in CR-Enabled Social Internet of Things. IEEE Access 11: 145706-145722 (2023) - [j63]Abdul Razaq, Musheer Ahmad, Ahmed A. Abd El-Latif:
A novel algebraic construction of strong S-boxes over double GF(27) structures and image protection. Comput. Appl. Math. 42(2) (2023) - [j62]Musheer Ahmad, Reem Ibrahim Alkanhel, Naglaa F. Soliman, Abeer D. Algarni, Fathi E. Abd El-Samie, Walid El-Shafai:
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion. Comput. Syst. Sci. Eng. 47(2): 2361-2380 (2023) - [j61]Amreen Ahmad, Tanvir Ahmad, Musheer Ahmad, Chanchal Kumar, Fayadh Alenezi, Majid Kamal A. Nour:
A complex network-based approach for security and governance in the smart green city. Expert Syst. Appl. 214: 119094 (2023) - [j60]Achraf Daoui, Mohamed Yamni, Torki Altameem, Musheer Ahmad, Mohamed Hammad, Pawel Plawiak, Ryszard Tadeusiewicz, Ahmed A. Abd El-Latif:
AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models. Sensors 23(21): 8957 (2023) - [j59]Umar Masud, Mohd. Sadiq, Sarfaraz Masood, Musheer Ahmad, Ahmed A. Abd El-Latif:
LW-DeepFakeNet: a lightweight time distributed CNN-LSTM network for real-time DeepFake video detection. Signal Image Video Process. 17(8): 4029-4037 (2023) - [j58]Amreen Ahmad, Tanvir Ahmad, Musheer Ahmad, Ammar Muthanna, Brij B. Gupta, Ahmed A. Abd El-Latif:
Determination of Critical Edges in Air Route Network Using Modified Weighted Sum Method and Grey Relational Analysis. IEEE Trans. Intell. Transp. Syst. 24(12): 15578-15589 (2023) - [j57]Muhammad Tanveer, Abd Ullah Khan, Musheer Ahmad, Tu N. Nguyen, Ahmed A. Abd El-Latif:
Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2525-2536 (2023) - [j56]Muhammad Tanveer, Abd Ullah Khan, Tu N. Nguyen, Musheer Ahmad, Ahmed A. Abd El-Latif:
Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing. IEEE Trans. Netw. Sci. Eng. 10(5): 3058-3070 (2023) - 2022
- [j55]Vinod Kumar, Ammar Mohammed Ali Al-Tameemi, Adesh Kumari, Musheer Ahmad, Mayadah Waheed Falah, Ahmed A. Abd El-Latif:
PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment. IEEE Access 10: 84776-84789 (2022) - [j54]Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Musheer Ahmad, Ahmed A. Abd El-Latif:
Biomedical Multimedia Encryption by Fractional-Order Meixner Polynomials Map and Quaternion Fractional-Order Meixner Moments. IEEE Access 10: 102599-102617 (2022) - [j53]Musheer Ahmad, Reem Alkanhel, Walid El Shafai, Abeer D. Algarni, Fathi E. Abd El-Samie, Naglaa F. Soliman:
Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine. IEEE Access 10: 112757-112775 (2022) - [j52]Amirul Haque, Tabarak Ali Abdulhussein, Musheer Ahmad, Mayadah Waheed Falah, Ahmed A. Abd El-Latif:
A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure. IEEE Access 10: 116167-116181 (2022) - [j51]Vincent Omollo Nyangaresi, Musheer Ahmad, Ahmed Alkhayyat, Wei Feng:
Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things. Expert Syst. J. Knowl. Eng. 39(10) (2022) - [j50]Saima Majid, Fayadh Alenezi, Sarfaraz Masood, Musheer Ahmad, Emine Selda Gündüz, Kemal Polat:
Attention based CNN model for fire detection and localization in real-world images. Expert Syst. Appl. 189: 116114 (2022) - [j49]Musheer Ahmad, Shafali Agarwal, Ahmed Alkhayyat, Adi Alhudhaif, Fayadh Alenezi, Amjad Hussain Zahid, Nojood O. Aljehane:
An image encryption algorithm based on new generalized fusion fractal structure. Inf. Sci. 592: 1-20 (2022) - [j48]Liya Zhu, Donghua Jiang, Jiangqun Ni, Xingyuan Wang, Xianwei Rong, Musheer Ahmad:
A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf. Sci. 607: 1001-1022 (2022) - [j47]Muhammad Tanveer, Musheer Ahmad, Hany S. Khalifa, Ahmed Alkhayyat, Ahmed A. Abd El-Latif:
A new anonymous authentication framework for secure smart grids applications. J. Inf. Secur. Appl. 71: 103336 (2022) - [j46]Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Musheer Ahmad, Ahmed A. Abd El-Latif:
Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 8927-8954 (2022) - [j45]Abdul Razaq, Shumaila Akhter, Awais Yousaf, Umer Shuaib, Musheer Ahmad:
A group theoretic construction of highly nonlinear substitution box and its applications in image encryption. Multim. Tools Appl. 81(3): 4163-4184 (2022) - [j44]Liya Zhu, Donghua Jiang, Jiangqun Ni, Xingyuan Wang, Xianwei Rong, Musheer Ahmad, Yingpin Chen:
A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing. Signal Process. 195: 108489 (2022) - [j43]Muneeb Ahmed, Sarfaraz Masood, Musheer Ahmad, Ahmed A. Abd El-Latif:
Intelligent Driver Drowsiness Detection for Traffic Safety Based on Multi CNN Deep Model and Facial Subsampling. IEEE Trans. Intell. Transp. Syst. 23(10): 19743-19752 (2022) - [j42]Vinod Kumar, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat, Jangirala Srinivas, Musheer Ahmad, Adesh Kumari:
RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J. Supercomput. 78(14): 16167-16196 (2022) - [j41]Ahmed Alkhayyat, Musheer Ahmad, Nestor Tsafack, Muhammad Tanveer, Donghua Jiang, Ahmed A. Abd El-Latif:
A Novel 4D Hyperchaotic System Assisted Josephus Permutation for Secure Substitution-Box Generation. J. Signal Process. Syst. 94(3): 315-328 (2022) - [j40]Abdul Razaq, Musheer Ahmad, Awais Yousaf, Moatsum Alawida, Atta Ullah, Umer Shuaib:
A Group Theoretic Construction of Large Number of AES-Like Substitution-Boxes. Wirel. Pers. Commun. 122(3): 2057-2080 (2022) - 2021
- [j39]Moatsum Alawida, Azman Samsudin, Nancy Alajarmeh, Je Sen Teh, Musheer Ahmad, Wafa' Hamdan Alshoura:
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence. IEEE Access 9: 17882-17897 (2021) - [j38]Amjad Hussain Zahid, Abdullah M. Iliyasu, Musheer Ahmad, Mian Muhammad Umar Shaban, Muhammad Junaid Arshad, Hussam S. Alhadawi, Ahmed A. Abd El-Latif:
A Novel Construction of Dynamic S-Box With High Nonlinearity Using Heuristic Evolution. IEEE Access 9: 67797-67812 (2021) - [j37]Behrooz Khadem, Amin Masoumi Suteh, Musheer Ahmad, Ahmed Alkhayyat, Mohammad Sabzinejad Farash, Hany S. Khalifa:
An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions. IEEE Access 9: 78463-78473 (2021) - [j36]Adi Alhudhaif, Musheer Ahmad, Ahmed Alkhayyat, Nestor Tsafack, Alaa Kadhim Farhan, Rafeeq Ahmed:
Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System. IEEE Access 9: 87686-87696 (2021) - [j35]Amjad Hussain Zahid, Lo'ai Tawalbeh, Musheer Ahmad, Ahmed Alkhayyat, Malik Tahir Hassan, Atif Manzoor, Alaa Kadhim Farhan:
Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications. IEEE Access 9: 98460-98475 (2021) - [j34]Amjad Hussain Zahid, Musheer Ahmad, Ahmed Alkhayyat, Muhammad Junaid Arshad, Mian Muhammad Umar Shaban, Naglaa F. Soliman, Abeer D. Algarni:
Construction of Optimized Dynamic S-Boxes Based on a Cubic Modular Transform and the Sine Function. IEEE Access 9: 131273-131285 (2021) - [j33]Muhammad Tanveer, Abd Ullah Khan, Habib Shah, Ahmed Alkhayyat, Shehzad Ashraf Chaudhry, Musheer Ahmad:
ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids. IEEE Access 9: 143366-143377 (2021) - [j32]Wei Feng, Zhentao Qin, Jing Zhang, Musheer Ahmad:
Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding. IEEE Access 9: 145459-145470 (2021) - [j31]Ishleen Kaur, M. N. Doja, Tanvir Ahmad, Musheer Ahmad, Amir Hussain, Ahmed Nadeem, Ahmed A. Abd El-Latif:
An Integrated Approach for Cancer Survival Prediction Using Data Mining Techniques. Comput. Intell. Neurosci. 2021: 6342226:1-6342226:14 (2021) - [j30]Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J. King Saud Univ. Comput. Inf. Sci. 33(1): 77-85 (2021) - [j29]Hussam S. Alhadawi, Mazlina Abdul Majid, Dragan Lambic, Musheer Ahmad:
A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multim. Tools Appl. 80(5): 7333-7350 (2021) - [j28]Abdul Razaq, Iqra, Musheer Ahmad, Muhammad Awais Yousaf, Sarfaraz Masood:
A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption. Multim. Tools Appl. 80(13): 20191-20215 (2021) - [j27]Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Brij B. Gupta, Musheer Ahmad, Ahmed A. Abd El-Latif:
A secure and efficient key agreement framework for critical energy infrastructure using mobile device. Telecommun. Syst. 78(4): 539-557 (2021) - 2020
- [j26]Muhammad Awais Yousaf, Hanan Alolaiyan, Musheer Ahmad, Muhammad Dilbar, Abdul Razaq:
Comparison of Pre and Post-Action of a Finite Abelian Group Over Certain Nonlinear Schemes. IEEE Access 8: 39781-39792 (2020) - [j25]Abdul Razaq, Hanan Alolaiyan, Musheer Ahmad, Muhammad Awais Yousaf, Umer Shuaib, Waqar Aslam, Moatsum Alawida:
A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups. IEEE Access 8: 75473-75490 (2020) - [j24]Musheer Ahmad, Eesa A. Alsolami, Ahmed Mohammed Alghamdi, Muhammad Awais Yousaf:
Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures. IEEE Access 8: 110397-110411 (2020) - [j23]Moatsum Alawida, Je Sen Teh, Damilare Peter Oyinloye, Wafa' Hamdan Alshoura, Musheer Ahmad, Rami S. Alkhawaldeh:
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata. IEEE Access 8: 113163-113174 (2020) - [j22]Musheer Ahmad, Ishfaq Ahmad Khaja, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami:
Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications. IEEE Access 8: 116132-116147 (2020) - [j21]Amjad Hussain Zahid, Eesa A. Alsolami, Musheer Ahmad:
A Novel Modular Approach Based Substitution-Box Design for Image Encryption. IEEE Access 8: 150326-150340 (2020) - [j20]Muhammad Tanveer, Amjad Hussain Zahid, Musheer Ahmad, Abdullah Baz, Hosam Alhakami:
LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment. IEEE Access 8: 155645-155659 (2020) - [j19]Musheer Ahmad, Eesa A. Alsolami:
Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation. Complex. 2020: 8868884:1-8868884:16 (2020) - [j18]Musheer Ahmad, Eesa A. Alsolami:
Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme. Entropy 22(7): 717 (2020) - [j17]Hussam S. Alhadawi, Dragan Lambic, Mohamad Fadli Zolkipli, Musheer Ahmad:
Globalized firefly algorithm and chaos for designing substitution box. J. Inf. Secur. Appl. 55: 102671 (2020) - [j16]Sarfaraz Masood, Abhinav Rai, Aakash Aggarwal, Mohammad Najam Doja, Musheer Ahmad:
Detecting distraction of drivers using Convolutional Neural Network. Pattern Recognit. Lett. 139: 79-85 (2020) - [j15]Alejandro Freyre-Echevarría, Ahmad Alanezi, Ismel Martínez-Díaz, Musheer Ahmad, Ahmed A. Abd El-Latif, Hoshang Kolivand, Abdul Razaq:
An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes. Symmetry 12(11): 1896 (2020)
2010 – 2019
- 2019
- [j14]Sajjad Shaukat Jamal, Amir Anees, Musheer Ahmad, Muhammad Fahad Khan, Iqtadar Hussain:
Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System. IEEE Access 7: 173273-173285 (2019) - [j13]Amjad Hussain Zahid, Muhammad Junaid Arshad, Musheer Ahmad:
A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation. Entropy 21(3): 245 (2019) - [j12]Hussam A. Ahmed, Mohamad Fadli Zolkipli, Musheer Ahmad:
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 31(11): 7201-7210 (2019) - 2018
- [j11]Amer Awad Alzaidi, Musheer Ahmad, Mohammad Najam Doja, Eesa A. Alsolami, M. M. Sufyan Beg:
A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes. IEEE Access 6: 55405-55418 (2018) - [j10]Amer Awad Alzaidi, Musheer Ahmad, Hussam S. Ahmed, Eesa A. Alsolami:
Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map. Complex. 2018: 9389065:1-9389065:16 (2018) - [j9]Eesa A. Alsolami, Musheer Ahmad, Christos K. Volos, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy 20(7): 525 (2018) - [j8]Dragan Lambic, Aleksandar Jankovic, Musheer Ahmad:
Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption. J. Electron. Test. 34(6): 709-715 (2018) - [j7]Musheer Ahmad, Zishan Ahmad:
Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption. Int. J. Rough Sets Data Anal. 5(2): 131-147 (2018) - [j6]Musheer Ahmad, Hamed D. Al-Sharari:
Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map. Int. J. Rough Sets Data Anal. 5(4): 61-73 (2018) - [j5]Musheer Ahmad, Mohammad Zaiyan Alam, Subia Ansari, Dragan Lambic, Hamed D. Al-Sharari:
Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network. J. Intell. Fuzzy Syst. 34(3): 1323-1332 (2018) - [j4]Musheer Ahmad, Eesa A. Alsolami, Xing-Yuan Wang, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg, Amer Awad Alzaidi:
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. Symmetry 10(7): 266 (2018) - [j3]Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
ABC Optimization Based Construction of Strong Substitution-Boxes. Wirel. Pers. Commun. 101(3): 1715-1729 (2018) - [c15]Musheer Ahmad, Mohammad Najam Doja, M. M. Sufyan Beg:
A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation. SSCC 2018: 543-553 - 2017
- [i8]Musheer Ahmad, Nikhil Mittal, Prerit Garg, Manaff Mahtab Khan:
Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos. CoRR abs/1704.04785 (2017) - [i7]Musheer Ahmad, Akshay Chopra:
Chaotic Dynamic S Boxes Based Substitution Approach for Digital Images. CoRR abs/1709.07620 (2017) - 2016
- [c14]Musheer Ahmad, Hamed D. Al-Sharari:
On the Security of Chaos-Based Watermarking Scheme for Secure Communication. FICTA (1) 2016: 313-321 - [c13]Sushmita Singh, Musheer Ahmad, Dhruv Malik:
Breaking an image encryption scheme based on chaotic synchronization phenomenon. IC3 2016: 1-4 - [c12]Sahil Wadhwa, Musheer Ahmad, Harsh Vijay:
Chaotic hash function based plain-image dependent block ciphering technique. ICACCI 2016: 633-637 - [i6]Musheer Ahmad, Hamed D. Al-Sharari:
Rotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication. CoRR abs/1607.05024 (2016) - 2015
- [c11]Musheer Ahmad, Faiyaz Ahmad, Zeba Nasim, Zohra Bano, Shadab Zafar:
Designing chaos based strong substitution box. IC3 2015: 97-100 - 2014
- [j2]Musheer Ahmad, Tanvir Ahmad:
Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys. Int. J. Commun. Networks Distributed Syst. 12(1): 113-128 (2014) - [c10]Musheer Ahmad, Akshay Chopra, Prakhar Jain, Shahzad Alam:
A Chaotic Substitution Based Image Encryption Using APA-transformation. FICTA (2) 2014: 75-83 - [c9]Musheer Ahmad, Faiyaz Ahmad:
Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher. FICTA (1) 2014: 481-488 - [c8]Musheer Ahmad, Parvez Mahmood Khan, Mohd. Zeeshan Ansari:
A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique. SNDS 2014: 540-550 - [c7]Pankaj Kumar Sharma, Musheer Ahmad, Parvez Mahmood Khan:
Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation. SSCC 2014: 173-181 - [i5]Musheer Ahmad, Hamed D. Al-Sharari:
An Inter-Component Pixels Permutation Based Color Image Encryption Using Hyper-chaos. CoRR abs/1403.4780 (2014) - [i4]Musheer Ahmad, Bashir Alam, Omar Farooq:
Chaos Based Mixed Keystream Generation for Voice Data Encryption. CoRR abs/1403.4782 (2014) - [i3]Musheer Ahmad, Hamed D. Al-Sharari, Munazza Nizam:
Security Improvement of an Image Encryption Based on mPixel-Chaotic-Shuffle and Pixel-Chaotic-Diffusion. CoRR abs/1403.6626 (2014) - [i2]Parvez Mahmood Khan, Mirza Mohd. Sufyan Beg, Musheer Ahmad:
Sustaining IT PMOs during Cycles of Global Recession. CoRR abs/1404.5034 (2014) - [i1]Swaleha Saeed, M. Sarosh Umar, M. Athar Ali, Musheer Ahmad:
Fisher-Yates Chaotic Shuffling Based Image Encryption. CoRR abs/1410.7540 (2014) - 2013
- [j1]Om Prakash Verma, Munazza Nizam, Musheer Ahmad:
Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption. J. Inf. Process. Syst. 9(2): 271-286 (2013) - [c6]Musheer Ahmad, Sonia Gupta, Amar Kumar Mohapatra:
A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data. FICTA 2013: 527-534 - [c5]Musheer Ahmad, Hitesh Chugh, Avish Goel, Prateek Singla:
A Chaos Based Method for Efficient Cryptographic S-box Design. SSCC 2013: 130-137 - 2011
- [c4]Musheer Ahmad, Omar Farooq, Sekharjit Datta, Shahab Saquib Sohail, Anoop Lal Vyas, David Mulvaney:
Chaos-based encryption of biomedical EEG signals using random quantization technique. BMEI 2011: 1471-1475 - [c3]Musheer Ahmad, Omar Farooq:
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform. HPAGC 2011: 257-264 - [c2]Musheer Ahmad:
Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem. IC3 2011: 81-91 - 2010
- [c1]Musheer Ahmad, Omar Farooq:
A Multi-Level Blocks Scrambling Based Chaotic Image Cipher. IC3 (1) 2010: 171-182
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint