Ramzi Guesmi - Academia.edu (original) (raw)
Papers by Ramzi Guesmi
International Journal of ADVANCED AND APPLIED SCIENCES
This paper presents an efficient method for categorizing the sentiments of Internet users, with a... more This paper presents an efficient method for categorizing the sentiments of Internet users, with a focus on social media users, using a confidence interval to estimate the reliability of sentiment predictions. The classification is based on the sentiments expressed in their posts, which are divided into positive, negative, and neutral categories. The paper presents an analysis table that analyzes sentiments and opinions about online product brands. The process includes two steps: 1) analyzing sentiments from text data using machine learning techniques, and 2) describing a five-step sentiment and opinion classification process that includes data collection, preprocessing, algorithm application, validation, and visualization. The proposed solution is implemented using Python, along with the scikit-learn, NumPy, pandas, and Dash libraries, and leverages the use of confidence intervals to assess the accuracy and reliability of the sentiment analysis model.
Multimedia Tools and Applications, Sep 10, 2020
In this paper, we propose a novel medical image encryption algorithm based on a hybrid model of d... more In this paper, we propose a novel medical image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and a new hybrid chaotic map. Our study uses DNA sequences and operations and the chaotic hybrid map to strengthen the cryptosystem. The significant advantages of this approach consist in improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext, has a large key space and a high key sensitivity, and is able to resist against the statistical and exhaustive attacks.
Optics and Laser Technology, 2020
We propose a new method for optical image encryption using fractional Fourier transform. • Our al... more We propose a new method for optical image encryption using fractional Fourier transform. • Our algorithm is based on Shannon's property of confusion and diffusion. • The confusion process is based on DNA encoding and on using DNA XOR to scramble the pixel values of the image.
Multimedia Tools and Applications, Feb 27, 2015
This paper proposes a color image encryption scheme using one-time keys based on crossover operat... more This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. Keywords Image encryption • Chaotic map • Hash function • Crossover 1 Introduction 1.1 Research background With the rapid development of information technology and network technology, digital images and other multimedia are more commonly and frequently transmitted in public
Nonlinear Dynamics, Sep 14, 2015
In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribo... more In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz system. Our study uses DNA sequences and operations and the chaotic Lorenz system to strengthen the cryptosystem. The significant advantages of this approach are improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext and has a large key space and a high key sensitivity, and it is able to resist against the statistical and exhaustive attacks.
Lecture Notes in Computer Science, 2021
Multimedia Tools and Applications, Mar 18, 2020
In this paper, we present a new design of cryptosystem characterized by an optimized substitution... more In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed S-box is generated using a modified genetic algorithm. The crossover process is performed with sophisticated research using the best previous population. We use randomness and ergodicity of the logistic map to add complexity and robustness to our proposed method. Many tests proving the nonlinearity of our S-box have been carried out to demonstrate the efficiency of our algorithm. In the second part, we offer a new permutation algorithm based on a chaotic sequence generated from the logistic map. To show the performance of our proposition, we compare our results with previous algorithms. The results of its statistical analysis, like entropy value and correlation between adjacent pixels, show that the proposed image encryption scheme provides security for image encryption. The time speed of the proposed algorithm confirms the possibility of real-time implementation.
Applied Sciences
By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new dimensio... more By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new dimensions of innovative services and processing power for contemporary living standards. IoT has a wide range of devices and communication entities as a result of the widespread applications of these services, making network management a challenging task. Therefore, it is critical to redesign the IoT network’s management. The inherent programmability and centralized capabilities of software-defined networking (SDN) make network management simpler, enable network abstraction, make network evolution easier, and have the potential to handle the IoT network. However, security issues still present the IoT dilemma. Distributed Denial of Service (DDoS) attacks are among the most significant security threats in IoT systems. This paper studies in-depth DDoS attacks in IoT and in SDN. A review of different detection and mitigation techniques based on SDN, blockchain and machine learning models is conduct...
Symmetry
In this paper, we propose a new method for drawing a cryptographically strong substitution box us... more In this paper, we propose a new method for drawing a cryptographically strong substitution box using the Lorenz system and quantum genetic algorithm techniques. We used the chaotic function to generate an initial random sequence of bits and the quantum crossover to provide a new and improved substitution box with increased non-linearity. The aim of the proposed algorithm was to generate a strong and secure substitution box that can be utilized in symmetric cryptosystems. The use of chaotic Boolean functions, genetic algorithm techniques, and the quantum crossover helped achieve this goal, and statistical tests further confirmed the randomness and efficiency of the generated substitution box. The results of the statistical test suite showed that the substitution box produced by the proposed algorithm is a “pass” in terms of randomness and has strong cryptographic properties. The tests include a frequency (monobit) test, a frequency test within a block, a linear complexity test, an ap...
2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015
In this manuscript we present a novel method to design a strong substitution box having important... more In this manuscript we present a novel method to design a strong substitution box having important cryptographic properties. Our method is based on chaos and take into account that an S-box can be viewed as a set of Boolean functions. Therefore, we will take advantage of the different characteristics of chaotic functions to generate random Boolean functions with high nonlinearity. Using these Boolean functions, we can create a highly nonlinear S-box. Afterwards, the proposed methodology is analyzed and tested for the following criteria: bijective property, nonlinearity, strict avalanche criterion, output bits independence criterion and equiprobable input/output XOR distribution. Numerical simulation and security analysis demonstrate that the proposed S-box has important cryptographic properties.
2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), 2014
ABSTRACT
Multimedia Tools and Applications, 2015
This paper proposes a color image encryption scheme using one-time keys based on crossover operat... more This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. Keywords Image encryption • Chaotic map • Hash function • Crossover 1 Introduction 1.1 Research background With the rapid development of information technology and network technology, digital images and other multimedia are more commonly and frequently transmitted in public
Multimedia Tools and Applications, 2020
In this paper, we present a new design of cryptosystem characterized by an optimized substitution... more In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed S-box is generated using a modified genetic algorithm. The crossover process is performed with sophisticated research using the best previous population. We use randomness and ergodicity of the logistic map to add complexity and robustness to our proposed method. Many tests proving the nonlinearity of our S-box have been carried out to demonstrate the efficiency of our algorithm. In the second part, we offer a new permutation algorithm based on a chaotic sequence generated from the logistic map. To show the performance of our proposition, we compare our results with previous algorithms. The results of its statistical analysis, like entropy value and correlation between adjacent pixels, show that the proposed image encryption scheme provides security for image encryption. The time speed of the proposed algorithm confirms the possibility of real-time implementation.
Applied Sciences
Brain tumor is a severe cancer and a life-threatening disease. Thus, early detection is crucial i... more Brain tumor is a severe cancer and a life-threatening disease. Thus, early detection is crucial in the process of treatment. Recent progress in the field of deep learning has contributed enormously to the health industry medical diagnosis. Convolutional neural networks (CNNs) have been intensively used as a deep learning approach to detect brain tumors using MRI images. Due to the limited dataset, deep learning algorithms and CNNs should be improved to be more efficient. Thus, one of the most known techniques used to improve model performance is Data Augmentation. This paper presents a detailed review of various CNN architectures and highlights the characteristics of particular models such as ResNet, AlexNet, and VGG. After that, we provide an efficient method for detecting brain tumors using magnetic resonance imaging (MRI) datasets based on CNN and data augmentation. Evaluation metrics values of the proposed solution prove that it succeeded in being a contribution to previous stud...
Nonlinear Dynamics, 2015
In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribo... more In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz system. Our study uses DNA sequences and operations and the chaotic Lorenz system to strengthen the cryptosystem. The significant advantages of this approach are improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext and has a large key space and a high key sensitivity, and it is able to resist against the statistical and exhaustive attacks.
In this paper, we propose a new method for optical image encryption using fractional Fourier tran... more In this paper, we propose a new method for optical image encryption using fractional Fourier transform, DNA sequence operation and chaos theory. Random phase masks are generated using iterative Lorenz map and the plain image is transformed to a DNA matrix. This matrix is combined with the random phase mask and then transformed three times using the fractional Fourier transform. An Optical implementation of the encryption algorithm is proposed in our work. According to the experiment results and security analysis, we find that our algorithm has good encryption effect, larger secret key space and high sensitivity to the secret key. It can resist to most known attacks, such as statistical analysis and exhaustive attacks. All these features show that our encryption algorithm is very suitable for digital image encryption.
Lecture Notes in Computer Science
Computational Science and Its Applications – ICCSA 2021
Multimedia Tools and Applications
International Journal of ADVANCED AND APPLIED SCIENCES
This paper presents an efficient method for categorizing the sentiments of Internet users, with a... more This paper presents an efficient method for categorizing the sentiments of Internet users, with a focus on social media users, using a confidence interval to estimate the reliability of sentiment predictions. The classification is based on the sentiments expressed in their posts, which are divided into positive, negative, and neutral categories. The paper presents an analysis table that analyzes sentiments and opinions about online product brands. The process includes two steps: 1) analyzing sentiments from text data using machine learning techniques, and 2) describing a five-step sentiment and opinion classification process that includes data collection, preprocessing, algorithm application, validation, and visualization. The proposed solution is implemented using Python, along with the scikit-learn, NumPy, pandas, and Dash libraries, and leverages the use of confidence intervals to assess the accuracy and reliability of the sentiment analysis model.
Multimedia Tools and Applications, Sep 10, 2020
In this paper, we propose a novel medical image encryption algorithm based on a hybrid model of d... more In this paper, we propose a novel medical image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and a new hybrid chaotic map. Our study uses DNA sequences and operations and the chaotic hybrid map to strengthen the cryptosystem. The significant advantages of this approach consist in improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext, has a large key space and a high key sensitivity, and is able to resist against the statistical and exhaustive attacks.
Optics and Laser Technology, 2020
We propose a new method for optical image encryption using fractional Fourier transform. • Our al... more We propose a new method for optical image encryption using fractional Fourier transform. • Our algorithm is based on Shannon's property of confusion and diffusion. • The confusion process is based on DNA encoding and on using DNA XOR to scramble the pixel values of the image.
Multimedia Tools and Applications, Feb 27, 2015
This paper proposes a color image encryption scheme using one-time keys based on crossover operat... more This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. Keywords Image encryption • Chaotic map • Hash function • Crossover 1 Introduction 1.1 Research background With the rapid development of information technology and network technology, digital images and other multimedia are more commonly and frequently transmitted in public
Nonlinear Dynamics, Sep 14, 2015
In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribo... more In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz system. Our study uses DNA sequences and operations and the chaotic Lorenz system to strengthen the cryptosystem. The significant advantages of this approach are improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext and has a large key space and a high key sensitivity, and it is able to resist against the statistical and exhaustive attacks.
Lecture Notes in Computer Science, 2021
Multimedia Tools and Applications, Mar 18, 2020
In this paper, we present a new design of cryptosystem characterized by an optimized substitution... more In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed S-box is generated using a modified genetic algorithm. The crossover process is performed with sophisticated research using the best previous population. We use randomness and ergodicity of the logistic map to add complexity and robustness to our proposed method. Many tests proving the nonlinearity of our S-box have been carried out to demonstrate the efficiency of our algorithm. In the second part, we offer a new permutation algorithm based on a chaotic sequence generated from the logistic map. To show the performance of our proposition, we compare our results with previous algorithms. The results of its statistical analysis, like entropy value and correlation between adjacent pixels, show that the proposed image encryption scheme provides security for image encryption. The time speed of the proposed algorithm confirms the possibility of real-time implementation.
Applied Sciences
By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new dimensio... more By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new dimensions of innovative services and processing power for contemporary living standards. IoT has a wide range of devices and communication entities as a result of the widespread applications of these services, making network management a challenging task. Therefore, it is critical to redesign the IoT network’s management. The inherent programmability and centralized capabilities of software-defined networking (SDN) make network management simpler, enable network abstraction, make network evolution easier, and have the potential to handle the IoT network. However, security issues still present the IoT dilemma. Distributed Denial of Service (DDoS) attacks are among the most significant security threats in IoT systems. This paper studies in-depth DDoS attacks in IoT and in SDN. A review of different detection and mitigation techniques based on SDN, blockchain and machine learning models is conduct...
Symmetry
In this paper, we propose a new method for drawing a cryptographically strong substitution box us... more In this paper, we propose a new method for drawing a cryptographically strong substitution box using the Lorenz system and quantum genetic algorithm techniques. We used the chaotic function to generate an initial random sequence of bits and the quantum crossover to provide a new and improved substitution box with increased non-linearity. The aim of the proposed algorithm was to generate a strong and secure substitution box that can be utilized in symmetric cryptosystems. The use of chaotic Boolean functions, genetic algorithm techniques, and the quantum crossover helped achieve this goal, and statistical tests further confirmed the randomness and efficiency of the generated substitution box. The results of the statistical test suite showed that the substitution box produced by the proposed algorithm is a “pass” in terms of randomness and has strong cryptographic properties. The tests include a frequency (monobit) test, a frequency test within a block, a linear complexity test, an ap...
2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015
In this manuscript we present a novel method to design a strong substitution box having important... more In this manuscript we present a novel method to design a strong substitution box having important cryptographic properties. Our method is based on chaos and take into account that an S-box can be viewed as a set of Boolean functions. Therefore, we will take advantage of the different characteristics of chaotic functions to generate random Boolean functions with high nonlinearity. Using these Boolean functions, we can create a highly nonlinear S-box. Afterwards, the proposed methodology is analyzed and tested for the following criteria: bijective property, nonlinearity, strict avalanche criterion, output bits independence criterion and equiprobable input/output XOR distribution. Numerical simulation and security analysis demonstrate that the proposed S-box has important cryptographic properties.
2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), 2014
ABSTRACT
Multimedia Tools and Applications, 2015
This paper proposes a color image encryption scheme using one-time keys based on crossover operat... more This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. Keywords Image encryption • Chaotic map • Hash function • Crossover 1 Introduction 1.1 Research background With the rapid development of information technology and network technology, digital images and other multimedia are more commonly and frequently transmitted in public
Multimedia Tools and Applications, 2020
In this paper, we present a new design of cryptosystem characterized by an optimized substitution... more In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed S-box is generated using a modified genetic algorithm. The crossover process is performed with sophisticated research using the best previous population. We use randomness and ergodicity of the logistic map to add complexity and robustness to our proposed method. Many tests proving the nonlinearity of our S-box have been carried out to demonstrate the efficiency of our algorithm. In the second part, we offer a new permutation algorithm based on a chaotic sequence generated from the logistic map. To show the performance of our proposition, we compare our results with previous algorithms. The results of its statistical analysis, like entropy value and correlation between adjacent pixels, show that the proposed image encryption scheme provides security for image encryption. The time speed of the proposed algorithm confirms the possibility of real-time implementation.
Applied Sciences
Brain tumor is a severe cancer and a life-threatening disease. Thus, early detection is crucial i... more Brain tumor is a severe cancer and a life-threatening disease. Thus, early detection is crucial in the process of treatment. Recent progress in the field of deep learning has contributed enormously to the health industry medical diagnosis. Convolutional neural networks (CNNs) have been intensively used as a deep learning approach to detect brain tumors using MRI images. Due to the limited dataset, deep learning algorithms and CNNs should be improved to be more efficient. Thus, one of the most known techniques used to improve model performance is Data Augmentation. This paper presents a detailed review of various CNN architectures and highlights the characteristics of particular models such as ResNet, AlexNet, and VGG. After that, we provide an efficient method for detecting brain tumors using magnetic resonance imaging (MRI) datasets based on CNN and data augmentation. Evaluation metrics values of the proposed solution prove that it succeeded in being a contribution to previous stud...
Nonlinear Dynamics, 2015
In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribo... more In this paper, we propose a novel image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and the Lorenz system. Our study uses DNA sequences and operations and the chaotic Lorenz system to strengthen the cryptosystem. The significant advantages of this approach are improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext and has a large key space and a high key sensitivity, and it is able to resist against the statistical and exhaustive attacks.
In this paper, we propose a new method for optical image encryption using fractional Fourier tran... more In this paper, we propose a new method for optical image encryption using fractional Fourier transform, DNA sequence operation and chaos theory. Random phase masks are generated using iterative Lorenz map and the plain image is transformed to a DNA matrix. This matrix is combined with the random phase mask and then transformed three times using the fractional Fourier transform. An Optical implementation of the encryption algorithm is proposed in our work. According to the experiment results and security analysis, we find that our algorithm has good encryption effect, larger secret key space and high sensitivity to the secret key. It can resist to most known attacks, such as statistical analysis and exhaustive attacks. All these features show that our encryption algorithm is very suitable for digital image encryption.
Lecture Notes in Computer Science
Computational Science and Its Applications – ICCSA 2021
Multimedia Tools and Applications