Ramzi Guesmi - Academia.edu (original) (raw)

Papers by Ramzi Guesmi

Research paper thumbnail of Efficient social media sentiment analysis using confidence interval-based classification of online product brands

International Journal of ADVANCED AND APPLIED SCIENCES

This paper presents an efficient method for categorizing the sentiments of Internet users, with a... more This paper presents an efficient method for categorizing the sentiments of Internet users, with a focus on social media users, using a confidence interval to estimate the reliability of sentiment predictions. The classification is based on the sentiments expressed in their posts, which are divided into positive, negative, and neutral categories. The paper presents an analysis table that analyzes sentiments and opinions about online product brands. The process includes two steps: 1) analyzing sentiments from text data using machine learning techniques, and 2) describing a five-step sentiment and opinion classification process that includes data collection, preprocessing, algorithm application, validation, and visualization. The proposed solution is implemented using Python, along with the scikit-learn, NumPy, pandas, and Dash libraries, and leverages the use of confidence intervals to assess the accuracy and reliability of the sentiment analysis model.

Research paper thumbnail of A new efficient medical image cipher based on hybrid chaotic map and DNA code

Multimedia Tools and Applications, Sep 10, 2020

In this paper, we propose a novel medical image encryption algorithm based on a hybrid model of d... more In this paper, we propose a novel medical image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and a new hybrid chaotic map. Our study uses DNA sequences and operations and the chaotic hybrid map to strengthen the cryptosystem. The significant advantages of this approach consist in improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext, has a large key space and a high key sensitivity, and is able to resist against the statistical and exhaustive attacks.

Research paper thumbnail of A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation

Optics and Laser Technology, 2020

We propose a new method for optical image encryption using fractional Fourier transform. • Our al... more We propose a new method for optical image encryption using fractional Fourier transform. • Our algorithm is based on Shannon's property of confusion and diffusion. • The confusion process is based on DNA encoding and on using DNA XOR to scramble the pixel values of the image.

Research paper thumbnail of Hash key-based image encryption using crossover operator and chaos

Multimedia Tools and Applications, Feb 27, 2015

This paper proposes a color image encryption scheme using one-time keys based on crossover operat... more This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. Keywords Image encryption • Chaotic map • Hash function • Crossover 1 Introduction 1.1 Research background With the rapid development of information technology and network technology, digital images and other multimedia are more commonly and frequently transmitted in public

Research paper thumbnail of A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2

Nonlinear Dynamics, Sep 14, 2015

In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribo... more In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz system. Our study uses DNA sequences and operations and the chaotic Lorenz system to strengthen the cryptosystem. The significant advantages of this approach are improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext and has a large key space and a high key sensitivity, and it is able to resist against the statistical and exhaustive attacks.

Research paper thumbnail of SMC: A New Strategy Based on Software-Defined Networking to Mitigate the Impact of Anomalies on Cooperative Cloud

Lecture Notes in Computer Science, 2021

Research paper thumbnail of A new design of cryptosystem based on S-box and chaotic permutation

Multimedia Tools and Applications, Mar 18, 2020

In this paper, we present a new design of cryptosystem characterized by an optimized substitution... more In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed S-box is generated using a modified genetic algorithm. The crossover process is performed with sophisticated research using the best previous population. We use randomness and ergodicity of the logistic map to add complexity and robustness to our proposed method. Many tests proving the nonlinearity of our S-box have been carried out to demonstrate the efficiency of our algorithm. In the second part, we offer a new permutation algorithm based on a chaotic sequence generated from the logistic map. To show the performance of our proposition, we compare our results with previous algorithms. The results of its statistical analysis, like entropy value and correlation between adjacent pixels, show that the proposed image encryption scheme provides security for image encryption. The time speed of the proposed algorithm confirms the possibility of real-time implementation.

Research paper thumbnail of Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks

Applied Sciences

By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new dimensio... more By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new dimensions of innovative services and processing power for contemporary living standards. IoT has a wide range of devices and communication entities as a result of the widespread applications of these services, making network management a challenging task. Therefore, it is critical to redesign the IoT network’s management. The inherent programmability and centralized capabilities of software-defined networking (SDN) make network management simpler, enable network abstraction, make network evolution easier, and have the potential to handle the IoT network. However, security issues still present the IoT dilemma. Distributed Denial of Service (DDoS) attacks are among the most significant security threats in IoT systems. This paper studies in-depth DDoS attacks in IoT and in SDN. A review of different detection and mitigation techniques based on SDN, blockchain and machine learning models is conduct...

Research paper thumbnail of A Novel Strong S-Box Design Using Quantum Crossover and Chaotic Boolean Functions for Symmetric Cryptosystems

Symmetry

In this paper, we propose a new method for drawing a cryptographically strong substitution box us... more In this paper, we propose a new method for drawing a cryptographically strong substitution box using the Lorenz system and quantum genetic algorithm techniques. We used the chaotic function to generate an initial random sequence of bits and the quantum crossover to provide a new and improved substitution box with increased non-linearity. The aim of the proposed algorithm was to generate a strong and secure substitution box that can be utilized in symmetric cryptosystems. The use of chaotic Boolean functions, genetic algorithm techniques, and the quantum crossover helped achieve this goal, and statistical tests further confirmed the randomness and efficiency of the generated substitution box. The results of the statistical test suite showed that the substitution box produced by the proposed algorithm is a “pass” in terms of randomness and has strong cryptographic properties. The tests include a frequency (monobit) test, a frequency test within a block, a linear complexity test, an ap...

Research paper thumbnail of High-performance hardware architecture of a robust block-cipher algorithm based on different chaotic maps and DNA sequence encoding

Research paper thumbnail of Chaos-based designing of a highly nonlinear S-box using Boolean functions

2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015

In this manuscript we present a novel method to design a strong substitution box having important... more In this manuscript we present a novel method to design a strong substitution box having important cryptographic properties. Our method is based on chaos and take into account that an S-box can be viewed as a set of Boolean functions. Therefore, we will take advantage of the different characteristics of chaotic functions to generate random Boolean functions with high nonlinearity. Using these Boolean functions, we can create a highly nonlinear S-box. Afterwards, the proposed methodology is analyzed and tested for the following criteria: bijective property, nonlinearity, strict avalanche criterion, output bits independence criterion and equiprobable input/output XOR distribution. Numerical simulation and security analysis demonstrate that the proposed S-box has important cryptographic properties.

Research paper thumbnail of A novel design of Chaos based S-Boxes using genetic algorithm techniques

2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), 2014

ABSTRACT

Research paper thumbnail of Hash key-based image encryption using crossover operator and chaos

Multimedia Tools and Applications, 2015

This paper proposes a color image encryption scheme using one-time keys based on crossover operat... more This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. Keywords Image encryption • Chaotic map • Hash function • Crossover 1 Introduction 1.1 Research background With the rapid development of information technology and network technology, digital images and other multimedia are more commonly and frequently transmitted in public

Research paper thumbnail of A new design of cryptosystem based on S-box and chaotic permutation

Multimedia Tools and Applications, 2020

In this paper, we present a new design of cryptosystem characterized by an optimized substitution... more In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed S-box is generated using a modified genetic algorithm. The crossover process is performed with sophisticated research using the best previous population. We use randomness and ergodicity of the logistic map to add complexity and robustness to our proposed method. Many tests proving the nonlinearity of our S-box have been carried out to demonstrate the efficiency of our algorithm. In the second part, we offer a new permutation algorithm based on a chaotic sequence generated from the logistic map. To show the performance of our proposition, we compare our results with previous algorithms. The results of its statistical analysis, like entropy value and correlation between adjacent pixels, show that the proposed image encryption scheme provides security for image encryption. The time speed of the proposed algorithm confirms the possibility of real-time implementation.

Research paper thumbnail of A Novel Data Augmentation-Based Brain Tumor Detection Using Convolutional Neural Network

Applied Sciences

Brain tumor is a severe cancer and a life-threatening disease. Thus, early detection is crucial i... more Brain tumor is a severe cancer and a life-threatening disease. Thus, early detection is crucial in the process of treatment. Recent progress in the field of deep learning has contributed enormously to the health industry medical diagnosis. Convolutional neural networks (CNNs) have been intensively used as a deep learning approach to detect brain tumors using MRI images. Due to the limited dataset, deep learning algorithms and CNNs should be improved to be more efficient. Thus, one of the most known techniques used to improve model performance is Data Augmentation. This paper presents a detailed review of various CNN architectures and highlights the characteristics of particular models such as ResNet, AlexNet, and VGG. After that, we provide an efficient method for detecting brain tumors using magnetic resonance imaging (MRI) datasets based on CNN and data augmentation. Evaluation metrics values of the proposed solution prove that it succeeded in being a contribution to previous stud...

Research paper thumbnail of A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2

Nonlinear Dynamics, 2015

In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribo... more In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz system. Our study uses DNA sequences and operations and the chaotic Lorenz system to strengthen the cryptosystem. The significant advantages of this approach are improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext and has a large key space and a high key sensitivity, and it is able to resist against the statistical and exhaustive attacks.

Research paper thumbnail of A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation

In this paper, we propose a new method for optical image encryption using fractional Fourier tran... more In this paper, we propose a new method for optical image encryption using fractional Fourier transform, DNA sequence operation and chaos theory. Random phase masks are generated using iterative Lorenz map and the plain image is transformed to a DNA matrix. This matrix is combined with the random phase mask and then transformed three times using the fractional Fourier transform. An Optical implementation of the encryption algorithm is proposed in our work. According to the experiment results and security analysis, we find that our algorithm has good encryption effect, larger secret key space and high sensitivity to the secret key. It can resist to most known attacks, such as statistical analysis and exhaustive attacks. All these features show that our encryption algorithm is very suitable for digital image encryption.

Research paper thumbnail of SMC: A New Strategy Based on Software-Defined Networking to Mitigate the Impact of Anomalies on Cooperative Cloud

Lecture Notes in Computer Science

Research paper thumbnail of Towards a Novel Vehicular Ad Hoc Networks Based on SDN

Computational Science and Its Applications – ICCSA 2021

Research paper thumbnail of A new efficient medical image cipher based on hybrid chaotic map and DNA code

Multimedia Tools and Applications

Research paper thumbnail of Efficient social media sentiment analysis using confidence interval-based classification of online product brands

International Journal of ADVANCED AND APPLIED SCIENCES

This paper presents an efficient method for categorizing the sentiments of Internet users, with a... more This paper presents an efficient method for categorizing the sentiments of Internet users, with a focus on social media users, using a confidence interval to estimate the reliability of sentiment predictions. The classification is based on the sentiments expressed in their posts, which are divided into positive, negative, and neutral categories. The paper presents an analysis table that analyzes sentiments and opinions about online product brands. The process includes two steps: 1) analyzing sentiments from text data using machine learning techniques, and 2) describing a five-step sentiment and opinion classification process that includes data collection, preprocessing, algorithm application, validation, and visualization. The proposed solution is implemented using Python, along with the scikit-learn, NumPy, pandas, and Dash libraries, and leverages the use of confidence intervals to assess the accuracy and reliability of the sentiment analysis model.

Research paper thumbnail of A new efficient medical image cipher based on hybrid chaotic map and DNA code

Multimedia Tools and Applications, Sep 10, 2020

In this paper, we propose a novel medical image encryption algorithm based on a hybrid model of d... more In this paper, we propose a novel medical image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and a new hybrid chaotic map. Our study uses DNA sequences and operations and the chaotic hybrid map to strengthen the cryptosystem. The significant advantages of this approach consist in improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext, has a large key space and a high key sensitivity, and is able to resist against the statistical and exhaustive attacks.

Research paper thumbnail of A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation

Optics and Laser Technology, 2020

We propose a new method for optical image encryption using fractional Fourier transform. • Our al... more We propose a new method for optical image encryption using fractional Fourier transform. • Our algorithm is based on Shannon's property of confusion and diffusion. • The confusion process is based on DNA encoding and on using DNA XOR to scramble the pixel values of the image.

Research paper thumbnail of Hash key-based image encryption using crossover operator and chaos

Multimedia Tools and Applications, Feb 27, 2015

This paper proposes a color image encryption scheme using one-time keys based on crossover operat... more This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. Keywords Image encryption • Chaotic map • Hash function • Crossover 1 Introduction 1.1 Research background With the rapid development of information technology and network technology, digital images and other multimedia are more commonly and frequently transmitted in public

Research paper thumbnail of A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2

Nonlinear Dynamics, Sep 14, 2015

In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribo... more In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz system. Our study uses DNA sequences and operations and the chaotic Lorenz system to strengthen the cryptosystem. The significant advantages of this approach are improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext and has a large key space and a high key sensitivity, and it is able to resist against the statistical and exhaustive attacks.

Research paper thumbnail of SMC: A New Strategy Based on Software-Defined Networking to Mitigate the Impact of Anomalies on Cooperative Cloud

Lecture Notes in Computer Science, 2021

Research paper thumbnail of A new design of cryptosystem based on S-box and chaotic permutation

Multimedia Tools and Applications, Mar 18, 2020

In this paper, we present a new design of cryptosystem characterized by an optimized substitution... more In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed S-box is generated using a modified genetic algorithm. The crossover process is performed with sophisticated research using the best previous population. We use randomness and ergodicity of the logistic map to add complexity and robustness to our proposed method. Many tests proving the nonlinearity of our S-box have been carried out to demonstrate the efficiency of our algorithm. In the second part, we offer a new permutation algorithm based on a chaotic sequence generated from the logistic map. To show the performance of our proposition, we compare our results with previous algorithms. The results of its statistical analysis, like entropy value and correlation between adjacent pixels, show that the proposed image encryption scheme provides security for image encryption. The time speed of the proposed algorithm confirms the possibility of real-time implementation.

Research paper thumbnail of Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks

Applied Sciences

By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new dimensio... more By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new dimensions of innovative services and processing power for contemporary living standards. IoT has a wide range of devices and communication entities as a result of the widespread applications of these services, making network management a challenging task. Therefore, it is critical to redesign the IoT network’s management. The inherent programmability and centralized capabilities of software-defined networking (SDN) make network management simpler, enable network abstraction, make network evolution easier, and have the potential to handle the IoT network. However, security issues still present the IoT dilemma. Distributed Denial of Service (DDoS) attacks are among the most significant security threats in IoT systems. This paper studies in-depth DDoS attacks in IoT and in SDN. A review of different detection and mitigation techniques based on SDN, blockchain and machine learning models is conduct...

Research paper thumbnail of A Novel Strong S-Box Design Using Quantum Crossover and Chaotic Boolean Functions for Symmetric Cryptosystems

Symmetry

In this paper, we propose a new method for drawing a cryptographically strong substitution box us... more In this paper, we propose a new method for drawing a cryptographically strong substitution box using the Lorenz system and quantum genetic algorithm techniques. We used the chaotic function to generate an initial random sequence of bits and the quantum crossover to provide a new and improved substitution box with increased non-linearity. The aim of the proposed algorithm was to generate a strong and secure substitution box that can be utilized in symmetric cryptosystems. The use of chaotic Boolean functions, genetic algorithm techniques, and the quantum crossover helped achieve this goal, and statistical tests further confirmed the randomness and efficiency of the generated substitution box. The results of the statistical test suite showed that the substitution box produced by the proposed algorithm is a “pass” in terms of randomness and has strong cryptographic properties. The tests include a frequency (monobit) test, a frequency test within a block, a linear complexity test, an ap...

Research paper thumbnail of High-performance hardware architecture of a robust block-cipher algorithm based on different chaotic maps and DNA sequence encoding

Research paper thumbnail of Chaos-based designing of a highly nonlinear S-box using Boolean functions

2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015

In this manuscript we present a novel method to design a strong substitution box having important... more In this manuscript we present a novel method to design a strong substitution box having important cryptographic properties. Our method is based on chaos and take into account that an S-box can be viewed as a set of Boolean functions. Therefore, we will take advantage of the different characteristics of chaotic functions to generate random Boolean functions with high nonlinearity. Using these Boolean functions, we can create a highly nonlinear S-box. Afterwards, the proposed methodology is analyzed and tested for the following criteria: bijective property, nonlinearity, strict avalanche criterion, output bits independence criterion and equiprobable input/output XOR distribution. Numerical simulation and security analysis demonstrate that the proposed S-box has important cryptographic properties.

Research paper thumbnail of A novel design of Chaos based S-Boxes using genetic algorithm techniques

2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), 2014

ABSTRACT

Research paper thumbnail of Hash key-based image encryption using crossover operator and chaos

Multimedia Tools and Applications, 2015

This paper proposes a color image encryption scheme using one-time keys based on crossover operat... more This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. Keywords Image encryption • Chaotic map • Hash function • Crossover 1 Introduction 1.1 Research background With the rapid development of information technology and network technology, digital images and other multimedia are more commonly and frequently transmitted in public

Research paper thumbnail of A new design of cryptosystem based on S-box and chaotic permutation

Multimedia Tools and Applications, 2020

In this paper, we present a new design of cryptosystem characterized by an optimized substitution... more In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed S-box is generated using a modified genetic algorithm. The crossover process is performed with sophisticated research using the best previous population. We use randomness and ergodicity of the logistic map to add complexity and robustness to our proposed method. Many tests proving the nonlinearity of our S-box have been carried out to demonstrate the efficiency of our algorithm. In the second part, we offer a new permutation algorithm based on a chaotic sequence generated from the logistic map. To show the performance of our proposition, we compare our results with previous algorithms. The results of its statistical analysis, like entropy value and correlation between adjacent pixels, show that the proposed image encryption scheme provides security for image encryption. The time speed of the proposed algorithm confirms the possibility of real-time implementation.

Research paper thumbnail of A Novel Data Augmentation-Based Brain Tumor Detection Using Convolutional Neural Network

Applied Sciences

Brain tumor is a severe cancer and a life-threatening disease. Thus, early detection is crucial i... more Brain tumor is a severe cancer and a life-threatening disease. Thus, early detection is crucial in the process of treatment. Recent progress in the field of deep learning has contributed enormously to the health industry medical diagnosis. Convolutional neural networks (CNNs) have been intensively used as a deep learning approach to detect brain tumors using MRI images. Due to the limited dataset, deep learning algorithms and CNNs should be improved to be more efficient. Thus, one of the most known techniques used to improve model performance is Data Augmentation. This paper presents a detailed review of various CNN architectures and highlights the characteristics of particular models such as ResNet, AlexNet, and VGG. After that, we provide an efficient method for detecting brain tumors using magnetic resonance imaging (MRI) datasets based on CNN and data augmentation. Evaluation metrics values of the proposed solution prove that it succeeded in being a contribution to previous stud...

Research paper thumbnail of A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2

Nonlinear Dynamics, 2015

In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribo... more In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz system. Our study uses DNA sequences and operations and the chaotic Lorenz system to strengthen the cryptosystem. The significant advantages of this approach are improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext and has a large key space and a high key sensitivity, and it is able to resist against the statistical and exhaustive attacks.

Research paper thumbnail of A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation

In this paper, we propose a new method for optical image encryption using fractional Fourier tran... more In this paper, we propose a new method for optical image encryption using fractional Fourier transform, DNA sequence operation and chaos theory. Random phase masks are generated using iterative Lorenz map and the plain image is transformed to a DNA matrix. This matrix is combined with the random phase mask and then transformed three times using the fractional Fourier transform. An Optical implementation of the encryption algorithm is proposed in our work. According to the experiment results and security analysis, we find that our algorithm has good encryption effect, larger secret key space and high sensitivity to the secret key. It can resist to most known attacks, such as statistical analysis and exhaustive attacks. All these features show that our encryption algorithm is very suitable for digital image encryption.

Research paper thumbnail of SMC: A New Strategy Based on Software-Defined Networking to Mitigate the Impact of Anomalies on Cooperative Cloud

Lecture Notes in Computer Science

Research paper thumbnail of Towards a Novel Vehicular Ad Hoc Networks Based on SDN

Computational Science and Its Applications – ICCSA 2021

Research paper thumbnail of A new efficient medical image cipher based on hybrid chaotic map and DNA code

Multimedia Tools and Applications