default search action
Musheer Ahmad 0002
Person information
- affiliation (since 2011): Jamia Millia Islamia, Department of Computer Engineering, New Delhi, India
- affiliation (PhD): Jamia Millia Islamia, Department of Computer Engineering, New Delhi, India
Other persons with the same name
- Musheer Ahmad 0001 — Jamia Millia Islamia, Department of Applied Sciences and Humanities, New Delhi, India (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j74]Abdul Razaq, Louai Maghrabi, Musheer Ahmad, Farrah Aslam, Wei Feng:
Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine. IEEE Access 12: 7584-7608 (2024) - [j73]Muhammad Tanveer, Ahmed A. Abd El-Latif, Abd Ullah Khan, Musheer Ahmad, Abdelhamied A. Ateya:
LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things. IEEE Access 12: 31771-31787 (2024) - [j72]Faisal Mohammed Alotaibi, Louai Maghrabi, Muhammad Tanveer, Musheer Ahmad, Qamar Hamid Naith:
RAP-MEC: Robust Authentication Protocol for the Mobile Edge Computing Services. IEEE Access 12: 109673-109689 (2024) - [j71]Vincent Omollo Nyangaresi, Eesa Alsolami, Musheer Ahmad:
Trust-Enabled Energy Efficient Protocol for Secure Remote Sensing in Supply Chain Management. IEEE Access 12: 113553-113564 (2024) - [j70]Wei Feng, Jing Zhang, Yao Chen, Zhentao Qin, Yushu Zhang, Musheer Ahmad, Marcin Wozniak:
Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 246: 123190 (2024) - [j69]Sarfaraz Masood, Rafiuddin Khan, Ahmed A. Abd El-Latif, Musheer Ahmad:
An FCN-LSTM model for neurological status detection from non-invasive multivariate sensor data. Neural Comput. Appl. 36(1): 77-93 (2024) - [j68]Munzir Hubiba Bashir, Musheer Ahmad, Danish Raza Rizvi, Ahmed A. Abd El-Latif:
Efficient CNN-based disaster events classification using UAV-aided images for emergency response application. Neural Comput. Appl. 36(18): 10599-10612 (2024) - 2023
- [j67]Sura Mahmood Abdullah, Thekra Abbas, Munzir Hubiba Bashir, Ishfaq Ahmad Khaja, Musheer Ahmad, Naglaa F. Soliman, Walid El-Shafai:
Deep Transfer Learning Based Parkinson's Disease Detection Using Optimized Feature Selection. IEEE Access 11: 3511-3524 (2023) - [j66]Salwa M. Serag Eldin, Ahmed A. Abd El-Latif, Samia Allaoua Chelloug, Musheer Ahmad, Ahmed H. Eldeeb, Tamer Omar Mohamed Diab, Wageda Ibrahim El Sobky, Hany Nasry Zaky:
Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences. IEEE Access 11: 101694-101709 (2023) - [j65]Amjad Hussain Zahid, Hafiz Ali Mansoor Elahi, Musheer Ahmad, Louai Maghrabi, Ramy Said Agieb Said:
Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity. IEEE Access 11: 139745-139758 (2023) - [j64]Abd Ullah Khan, Muhammad Tanveer, Hyundong Shin, Musheer Ahmad, Ammar Muthanna, Abdukodir Khakimov, Fahad Alblehai, Ahmed A. Abd El-Latif:
Toward Spectrum Efficiency and Reliability for Heterogeneous Users in CR-Enabled Social Internet of Things. IEEE Access 11: 145706-145722 (2023) - [j63]Abdul Razaq, Musheer Ahmad, Ahmed A. Abd El-Latif:
A novel algebraic construction of strong S-boxes over double GF(27) structures and image protection. Comput. Appl. Math. 42(2) (2023) - [j62]Musheer Ahmad, Reem Ibrahim Alkanhel, Naglaa F. Soliman, Abeer D. Algarni, Fathi E. Abd El-Samie, Walid El-Shafai:
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion. Comput. Syst. Sci. Eng. 47(2): 2361-2380 (2023) - [j61]Amreen Ahmad, Tanvir Ahmad, Musheer Ahmad, Chanchal Kumar, Fayadh Alenezi, Majid Kamal A. Nour:
A complex network-based approach for security and governance in the smart green city. Expert Syst. Appl. 214: 119094 (2023) - [j60]Achraf Daoui, Mohamed Yamni, Torki Altameem, Musheer Ahmad, Mohamed Hammad, Pawel Plawiak, Ryszard Tadeusiewicz, Ahmed A. Abd El-Latif:
AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models. Sensors 23(21): 8957 (2023) - [j59]Umar Masud, Mohd. Sadiq, Sarfaraz Masood, Musheer Ahmad, Ahmed A. Abd El-Latif:
LW-DeepFakeNet: a lightweight time distributed CNN-LSTM network for real-time DeepFake video detection. Signal Image Video Process. 17(8): 4029-4037 (2023) - [j58]Amreen Ahmad, Tanvir Ahmad, Musheer Ahmad, Ammar Muthanna, Brij B. Gupta, Ahmed A. Abd El-Latif:
Determination of Critical Edges in Air Route Network Using Modified Weighted Sum Method and Grey Relational Analysis. IEEE Trans. Intell. Transp. Syst. 24(12): 15578-15589 (2023) - [j57]Muhammad Tanveer, Abd Ullah Khan, Musheer Ahmad, Tu N. Nguyen, Ahmed A. Abd El-Latif:
Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2525-2536 (2023) - [j56]Muhammad Tanveer, Abd Ullah Khan, Tu N. Nguyen, Musheer Ahmad, Ahmed A. Abd El-Latif:
Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing. IEEE Trans. Netw. Sci. Eng. 10(5): 3058-3070 (2023) - 2022
- [j55]Vinod Kumar, Ammar Mohammed Ali Al-Tameemi, Adesh Kumari, Musheer Ahmad, Mayadah Waheed Falah, Ahmed A. Abd El-Latif:
PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment. IEEE Access 10: 84776-84789 (2022) - [j54]Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Musheer Ahmad, Ahmed A. Abd El-Latif:
Biomedical Multimedia Encryption by Fractional-Order Meixner Polynomials Map and Quaternion Fractional-Order Meixner Moments. IEEE Access 10: 102599-102617 (2022) - [j53]Musheer Ahmad, Reem Alkanhel, Walid El Shafai, Abeer D. Algarni, Fathi E. Abd El-Samie, Naglaa F. Soliman:
Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine. IEEE Access 10: 112757-112775 (2022) - [j52]Amirul Haque, Tabarak Ali Abdulhussein, Musheer Ahmad, Mayadah Waheed Falah, Ahmed A. Abd El-Latif:
A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure. IEEE Access 10: 116167-116181 (2022) - [j51]Vincent Omollo Nyangaresi, Musheer Ahmad, Ahmed Alkhayyat, Wei Feng:
Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things. Expert Syst. J. Knowl. Eng. 39(10) (2022) - [j50]Saima Majid, Fayadh Alenezi, Sarfaraz Masood, Musheer Ahmad, Emine Selda Gündüz, Kemal Polat:
Attention based CNN model for fire detection and localization in real-world images. Expert Syst. Appl. 189: 116114 (2022) - [j49]Musheer Ahmad, Shafali Agarwal, Ahmed Alkhayyat, Adi Alhudhaif, Fayadh Alenezi, Amjad Hussain Zahid, Nojood O. Aljehane:
An image encryption algorithm based on new generalized fusion fractal structure. Inf. Sci. 592: 1-20 (2022) - [j48]Liya Zhu, Donghua Jiang, Jiangqun Ni, Xingyuan Wang, Xianwei Rong, Musheer Ahmad:
A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf. Sci. 607: 1001-1022 (2022) - [j47]Muhammad Tanveer, Musheer Ahmad, Hany S. Khalifa, Ahmed Alkhayyat, Ahmed A. Abd El-Latif:
A new anonymous authentication framework for secure smart grids applications. J. Inf. Secur. Appl. 71: 103336 (2022) - [j46]Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Musheer Ahmad, Ahmed A. Abd El-Latif:
Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 8927-8954 (2022) - [j45]Abdul Razaq, Shumaila Akhter, Awais Yousaf, Umer Shuaib, Musheer Ahmad:
A group theoretic construction of highly nonlinear substitution box and its applications in image encryption. Multim. Tools Appl. 81(3): 4163-4184 (2022) - [j44]Liya Zhu, Donghua Jiang, Jiangqun Ni, Xingyuan Wang, Xianwei Rong, Musheer Ahmad, Yingpin Chen:
A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing. Signal Process. 195: 108489 (2022) - [j43]Muneeb Ahmed, Sarfaraz Masood, Musheer Ahmad, Ahmed A. Abd El-Latif:
Intelligent Driver Drowsiness Detection for Traffic Safety Based on Multi CNN Deep Model and Facial Subsampling. IEEE Trans. Intell. Transp. Syst. 23(10): 19743-19752 (2022) - [j42]Vinod Kumar, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat, Jangirala Srinivas, Musheer Ahmad, Adesh Kumari:
RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J. Supercomput. 78(14): 16167-16196 (2022) - [j41]Ahmed Alkhayyat, Musheer Ahmad, Nestor Tsafack, Muhammad Tanveer, Donghua Jiang, Ahmed A. Abd El-Latif:
A Novel 4D Hyperchaotic System Assisted Josephus Permutation for Secure Substitution-Box Generation. J. Signal Process. Syst. 94(3): 315-328 (2022) - [j40]Abdul Razaq, Musheer Ahmad, Awais Yousaf, Moatsum Alawida, Atta Ullah, Umer Shuaib:
A Group Theoretic Construction of Large Number of AES-Like Substitution-Boxes. Wirel. Pers. Commun. 122(3): 2057-2080 (2022) - 2021
- [j39]Moatsum Alawida, Azman Samsudin, Nancy Alajarmeh, Je Sen Teh, Musheer Ahmad, Wafa' Hamdan Alshoura:
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence. IEEE Access 9: 17882-17897 (2021) - [j38]Amjad Hussain Zahid, Abdullah M. Iliyasu, Musheer Ahmad, Mian Muhammad Umar Shaban, Muhammad Junaid Arshad, Hussam S. Alhadawi, Ahmed A. Abd El-Latif:
A Novel Construction of Dynamic S-Box With High Nonlinearity Using Heuristic Evolution. IEEE Access 9: 67797-67812 (2021) - [j37]Behrooz Khadem, Amin Masoumi Suteh, Musheer Ahmad, Ahmed Alkhayyat, Mohammad Sabzinejad Farash, Hany S. Khalifa:
An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions. IEEE Access 9: 78463-78473 (2021) - [j36]Adi Alhudhaif, Musheer Ahmad, Ahmed Alkhayyat, Nestor Tsafack, Alaa Kadhim Farhan, Rafeeq Ahmed:
Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System. IEEE Access 9: 87686-87696 (2021) - [j35]Amjad Hussain Zahid, Lo'ai Tawalbeh, Musheer Ahmad, Ahmed Alkhayyat, Malik Tahir Hassan, Atif Manzoor, Alaa Kadhim Farhan:
Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications. IEEE Access 9: 98460-98475 (2021) - [j34]Amjad Hussain Zahid, Musheer Ahmad, Ahmed Alkhayyat, Muhammad Junaid Arshad, Mian Muhammad Umar Shaban, Naglaa F. Soliman, Abeer D. Algarni:
Construction of Optimized Dynamic S-Boxes Based on a Cubic Modular Transform and the Sine Function. IEEE Access 9: 131273-131285 (2021) - [j33]Muhammad Tanveer, Abd Ullah Khan, Habib Shah, Ahmed Alkhayyat, Shehzad Ashraf Chaudhry, Musheer Ahmad:
ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids. IEEE Access 9: 143366-143377 (2021) - [j32]Wei Feng, Zhentao Qin, Jing Zhang, Musheer Ahmad:
Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding. IEEE Access 9: 145459-145470 (2021) - [j31]Ishleen Kaur, M. N. Doja, Tanvir Ahmad, Musheer Ahmad, Amir Hussain, Ahmed Nadeem, Ahmed A. Abd El-Latif:
An Integrated Approach for Cancer Survival Prediction Using Data Mining Techniques. Comput. Intell. Neurosci. 2021: 6342226:1-6342226:14 (2021) - [j30]Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J. King Saud Univ. Comput. Inf. Sci. 33(1): 77-85 (2021) - [j29]Hussam S. Alhadawi, Mazlina Abdul Majid, Dragan Lambic, Musheer Ahmad:
A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multim. Tools Appl. 80(5): 7333-7350 (2021) - [j28]Abdul Razaq, Iqra, Musheer Ahmad, Muhammad Awais Yousaf, Sarfaraz Masood:
A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption. Multim. Tools Appl. 80(13): 20191-20215 (2021) - [j27]Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Brij B. Gupta, Musheer Ahmad, Ahmed A. Abd El-Latif:
A secure and efficient key agreement framework for critical energy infrastructure using mobile device. Telecommun. Syst. 78(4): 539-557 (2021) - 2020
- [j26]Muhammad Awais Yousaf, Hanan Alolaiyan, Musheer Ahmad, Muhammad Dilbar, Abdul Razaq:
Comparison of Pre and Post-Action of a Finite Abelian Group Over Certain Nonlinear Schemes. IEEE Access 8: 39781-39792 (2020) - [j25]Abdul Razaq, Hanan Alolaiyan, Musheer Ahmad, Muhammad Awais Yousaf, Umer Shuaib, Waqar Aslam, Moatsum Alawida:
A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups. IEEE Access 8: 75473-75490 (2020) - [j24]Musheer Ahmad, Eesa A. Alsolami, Ahmed Mohammed Alghamdi, Muhammad Awais Yousaf:
Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures. IEEE Access 8: 110397-110411 (2020) - [j23]Moatsum Alawida, Je Sen Teh, Damilare Peter Oyinloye, Wafa' Hamdan Alshoura, Musheer Ahmad, Rami S. Alkhawaldeh:
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata. IEEE Access 8: 113163-113174 (2020) - [j22]Musheer Ahmad, Ishfaq Ahmad Khaja, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami:
Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications. IEEE Access 8: 116132-116147 (2020) - [j21]Amjad Hussain Zahid, Eesa A. Alsolami, Musheer Ahmad:
A Novel Modular Approach Based Substitution-Box Design for Image Encryption. IEEE Access 8: 150326-150340 (2020) - [j20]Muhammad Tanveer, Amjad Hussain Zahid, Musheer Ahmad, Abdullah Baz, Hosam Alhakami:
LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment. IEEE Access 8: 155645-155659 (2020) - [j19]Musheer Ahmad, Eesa A. Alsolami:
Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation. Complex. 2020: 8868884:1-8868884:16 (2020) - [j18]Musheer Ahmad, Eesa A. Alsolami:
Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme. Entropy 22(7): 717 (2020) - [j17]Hussam S. Alhadawi, Dragan Lambic, Mohamad Fadli Zolkipli, Musheer Ahmad:
Globalized firefly algorithm and chaos for designing substitution box. J. Inf. Secur. Appl. 55: 102671 (2020) - [j16]Sarfaraz Masood, Abhinav Rai, Aakash Aggarwal, Mohammad Najam Doja, Musheer Ahmad:
Detecting distraction of drivers using Convolutional Neural Network. Pattern Recognit. Lett. 139: 79-85 (2020) - [j15]Alejandro Freyre-Echevarría, Ahmad Alanezi, Ismel Martínez-Díaz, Musheer Ahmad, Ahmed A. Abd El-Latif, Hoshang Kolivand, Abdul Razaq:
An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes. Symmetry 12(11): 1896 (2020)
2010 – 2019
- 2019
- [j14]Sajjad Shaukat Jamal, Amir Anees, Musheer Ahmad, Muhammad Fahad Khan, Iqtadar Hussain:
Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System. IEEE Access 7: 173273-173285 (2019) - [j13]Amjad Hussain Zahid, Muhammad Junaid Arshad, Musheer Ahmad:
A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation. Entropy 21(3): 245 (2019) - [j12]Hussam A. Ahmed, Mohamad Fadli Zolkipli, Musheer Ahmad:
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 31(11): 7201-7210 (2019) - 2018
- [j11]Amer Awad Alzaidi, Musheer Ahmad, Mohammad Najam Doja, Eesa A. Alsolami, M. M. Sufyan Beg:
A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes. IEEE Access 6: 55405-55418 (2018) - [j10]Amer Awad Alzaidi, Musheer Ahmad, Hussam S. Ahmed, Eesa A. Alsolami:
Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map. Complex. 2018: 9389065:1-9389065:16 (2018) - [j9]Eesa A. Alsolami, Musheer Ahmad, Christos K. Volos, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy 20(7): 525 (2018) - [j8]Dragan Lambic, Aleksandar Jankovic, Musheer Ahmad:
Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption. J. Electron. Test. 34(6): 709-715 (2018) - [j7]Musheer Ahmad, Zishan Ahmad:
Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption. Int. J. Rough Sets Data Anal. 5(2): 131-147 (2018) - [j6]Musheer Ahmad, Hamed D. Al-Sharari:
Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map. Int. J. Rough Sets Data Anal. 5(4): 61-73 (2018) - [j5]Musheer Ahmad, Mohammad Zaiyan Alam, Subia Ansari, Dragan Lambic, Hamed D. Al-Sharari:
Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network. J. Intell. Fuzzy Syst. 34(3): 1323-1332 (2018) - [j4]Musheer Ahmad, Eesa A. Alsolami, Xing-Yuan Wang, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg, Amer Awad Alzaidi:
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. Symmetry 10(7): 266 (2018) - [j3]Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
ABC Optimization Based Construction of Strong Substitution-Boxes. Wirel. Pers. Commun. 101(3): 1715-1729 (2018) - [c15]Musheer Ahmad, Mohammad Najam Doja, M. M. Sufyan Beg:
A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation. SSCC 2018: 543-553 - 2017
- [i8]Musheer Ahmad, Nikhil Mittal, Prerit Garg, Manaff Mahtab Khan:
Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos. CoRR abs/1704.04785 (2017) - [i7]Musheer Ahmad, Akshay Chopra:
Chaotic Dynamic S Boxes Based Substitution Approach for Digital Images. CoRR abs/1709.07620 (2017) - 2016
- [c14]Musheer Ahmad, Hamed D. Al-Sharari:
On the Security of Chaos-Based Watermarking Scheme for Secure Communication. FICTA (1) 2016: 313-321 - [c13]Sushmita Singh, Musheer Ahmad, Dhruv Malik:
Breaking an image encryption scheme based on chaotic synchronization phenomenon. IC3 2016: 1-4 - [c12]Sahil Wadhwa, Musheer Ahmad, Harsh Vijay:
Chaotic hash function based plain-image dependent block ciphering technique. ICACCI 2016: 633-637 - [i6]Musheer Ahmad, Hamed D. Al-Sharari:
Rotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication. CoRR abs/1607.05024 (2016) - 2015
- [c11]Musheer Ahmad, Faiyaz Ahmad, Zeba Nasim, Zohra Bano, Shadab Zafar:
Designing chaos based strong substitution box. IC3 2015: 97-100 - 2014
- [j2]Musheer Ahmad, Tanvir Ahmad:
Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys. Int. J. Commun. Networks Distributed Syst. 12(1): 113-128 (2014) - [c10]Musheer Ahmad, Akshay Chopra, Prakhar Jain, Shahzad Alam:
A Chaotic Substitution Based Image Encryption Using APA-transformation. FICTA (2) 2014: 75-83 - [c9]Musheer Ahmad, Faiyaz Ahmad:
Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher. FICTA (1) 2014: 481-488 - [c8]Musheer Ahmad, Parvez Mahmood Khan, Mohd. Zeeshan Ansari:
A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique. SNDS 2014: 540-550 - [c7]Pankaj Kumar Sharma, Musheer Ahmad, Parvez Mahmood Khan:
Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation. SSCC 2014: 173-181 - [i5]Musheer Ahmad, Hamed D. Al-Sharari:
An Inter-Component Pixels Permutation Based Color Image Encryption Using Hyper-chaos. CoRR abs/1403.4780 (2014) - [i4]Musheer Ahmad, Bashir Alam, Omar Farooq:
Chaos Based Mixed Keystream Generation for Voice Data Encryption. CoRR abs/1403.4782 (2014) - [i3]Musheer Ahmad, Hamed D. Al-Sharari, Munazza Nizam:
Security Improvement of an Image Encryption Based on mPixel-Chaotic-Shuffle and Pixel-Chaotic-Diffusion. CoRR abs/1403.6626 (2014) - [i2]Parvez Mahmood Khan, Mirza Mohd. Sufyan Beg, Musheer Ahmad:
Sustaining IT PMOs during Cycles of Global Recession. CoRR abs/1404.5034 (2014) - [i1]Swaleha Saeed, M. Sarosh Umar, M. Athar Ali, Musheer Ahmad:
Fisher-Yates Chaotic Shuffling Based Image Encryption. CoRR abs/1410.7540 (2014) - 2013
- [j1]Om Prakash Verma, Munazza Nizam, Musheer Ahmad:
Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption. J. Inf. Process. Syst. 9(2): 271-286 (2013) - [c6]Musheer Ahmad, Sonia Gupta, Amar Kumar Mohapatra:
A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data. FICTA 2013: 527-534 - [c5]Musheer Ahmad, Hitesh Chugh, Avish Goel, Prateek Singla:
A Chaos Based Method for Efficient Cryptographic S-box Design. SSCC 2013: 130-137 - 2011
- [c4]Musheer Ahmad, Omar Farooq, Sekharjit Datta, Shahab Saquib Sohail, Anoop Lal Vyas, David Mulvaney:
Chaos-based encryption of biomedical EEG signals using random quantization technique. BMEI 2011: 1471-1475 - [c3]Musheer Ahmad, Omar Farooq:
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform. HPAGC 2011: 257-264 - [c2]Musheer Ahmad:
Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem. IC3 2011: 81-91 - 2010
- [c1]Musheer Ahmad, Omar Farooq:
A Multi-Level Blocks Scrambling Based Chaotic Image Cipher. IC3 (1) 2010: 171-182