Sajid Khan

ORCID: 0000-0001-7027-024X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • DNA and Biological Computing
  • Advanced Steganography and Watermarking Techniques
  • Cryptographic Implementations and Security
  • Cloud Data Security Solutions
  • Distributed and Parallel Computing Systems
  • Data-Driven Disease Surveillance
  • Fractal and DNA sequence analysis
  • Network Security and Intrusion Detection
  • Wireless Communication Security Techniques
  • Urban Transport and Accessibility
  • Chaos control and synchronization
  • Cybersecurity and Information Systems
  • Cellular Automata and Applications
  • Human Mobility and Location-Based Analysis
  • Cloud Computing and Resource Management
  • Mathematical Dynamics and Fractals
  • Digital and Cyber Forensics
  • Information Systems and Technology Applications
  • ERP Systems Implementation and Impact
  • Parallel Computing and Optimization Techniques
  • IoT and Edge/Fog Computing
  • Embedded Systems Design Techniques

Zhejiang Normal University
2024-2025

BioElectronics (United States)
2025

Guangzhou University
2021

Huazhong University of Science and Technology
2019-2020

Jaypee Institute of Information Technology
2018

Aditya Birla (India)
2017

With the fast development of Internet Things (IoT) technologies, more IoT devices are currently connected with Internet, resulting in exchange information. However, data privacy and security threats have become emerging challenges IoT. In this paper, we concerned about image transmission green Image encryption algorithms for faced two challenges: 1) To save cost, always very low computing power, so they cannot support high-precision 2) The algorithm deployed on device should be efficient to...

10.1109/tgcn.2021.3095707 article EN IEEE Transactions on Green Communications and Networking 2021-07-08

Image encryption is an efficient and vital way to protect classified secret images. With the advancement of processing power computer, AES, DES, or chaotic series type just alike image schemes are not as secure before. Therefore, in this paper, we present a new hybrid method for protecting imperative images by employing logistic sine system (LSS) together with two-dimensional cellular automata FSM-based DNA rule generator. The hash (SHA-256) algorithm used generate key compute initial values...

10.1109/access.2019.2920383 article EN cc-by-nc-nd IEEE Access 2019-01-01

Several secure image encryption systems have been researched and formed by chaotic mechanisms in current decades. This work recommends an innovative quantum color method focused on the Lucas series-based substitution box to enhance competence of encryption. The suggested technique has more excellent key space significant confidentiality. system, along with box, exhibits additional complicated dynamical behavior, sufficient arbitrariness, uncertainty than all others just models. Theoretical...

10.3390/e22111276 article EN cc-by Entropy 2020-11-11

Bit-level and pixel-level methods are two classifications for image encryption, which describe the smallest processing elements manipulated in diffusion permutation respectively. Most merely alter positions of pixels, resulting similar histograms original permuted images. methods, however, have ability to change histogram image, but usually not preferred due their time-consuming nature, is owed bit-level computation, unlike that other techniques. In this paper, we introduce a new encryption...

10.3390/e22010112 article EN cc-by Entropy 2020-01-16

The main purpose of this research is to study the effect various types venues on density distribution residents and model check-in data from a Location-Based Social Network for city Shanghai, China by using combination multiple temporal, spatial visualization techniques classifying users’ check-ins into different venue categories. This article investigates use Weibo big analysis its efficiency in categories instead manually collected datasets, exploring relation between time, frequency,...

10.3390/ijgi9120733 article EN cc-by ISPRS International Journal of Geo-Information 2020-12-07

Abstract Freshly, an innumerable chaotic system based complex and more time‐consuming image encryption algorithms have been proposed. The majority of those scrambling diffusion like two phases or rounds before performing the actual encryption, which leads toward extra time consumption. So unlike those, this article presents a novel algorithm that is on game trick. proposed method DNA it can accomplish dual function with one round, is, for bit planes pixels, we called as DNA‐SPD. First all,...

10.1002/ett.4034 article EN Transactions on Emerging Telecommunications Technologies 2020-07-07

This research provides an approach to exploring a suitable enterprise resource planning system using cloud management architecture for the educational environment. It enables enterprises get into competition. Enterprise firms address targeted female population. To achieve this goal, has been established that infrastructure basis on governments, nongovernment organizations (NGOs), universities, and other social service providers. paper helps present of computing overall environment concerns...

10.3390/electronics9111758 article EN Electronics 2020-10-23

Color image encryption has enticed a lot of attention in recent years. Many authors proposed chaotic system-based algorithms for that purpose. However, due to the shortcomings low dimensional systems, similar rule structure RGB channels, and small keyspace, many those were cryptanalyzed by chosen-plaintext or other well-known attacks. A Security vulnerability exists because same method being applied over channels. This paper aims introduce new three-channel three rules (3C3R) algorithm along...

10.3390/e21111075 article EN cc-by Entropy 2019-11-02

The sparse matrix–vector product (SpMV) is a fundamental computational kernel utilized in diverse range of scientific and engineering applications. It commonly used to solve linear partial differential equations. parallel computation the SpMV challenging task. Existing solutions often employ fixed number threads assignment rows based on empirical formulas, leading sub-optimal configurations significant performance losses. Elegante, our proposed machine learning-powered tool, utilizes...

10.3390/info15110685 article EN cc-by Information 2024-11-01

10.32628/ijsrst1845482 article EN International Journal of Scientific Research in Science and Technology 2018-05-30
Coming Soon ...