Mohamed Gafsi

ORCID: 0000-0002-3623-9844
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cellular Automata and Applications
  • Cryptographic Implementations and Security
  • Advanced Data Compression Techniques
  • Mathematical Dynamics and Fractals
  • Coding theory and cryptography
  • Fractal and DNA sequence analysis
  • Cryptography and Residue Arithmetic
  • Chaos control and synchronization
  • Advanced Numerical Analysis Techniques
  • advanced mathematical theories
  • Image and Signal Denoising Methods
  • Computer Graphics and Visualization Techniques
  • DNA and Biological Computing
  • Algorithms and Data Compression
  • Numerical Methods and Algorithms

University of Monastir
2015-2024

Bridge University
2022

Ecole Nationale d'Ingénieurs de Monastir
2019

In the medical sector, digital image is multimedia data that contain secret information. However, designing an efficient secure cryptosystem to protect confidential images in sharing a challenge. this work, we propose improved chaos-based encrypt and decrypt rapidly images. A complex PRNG suggested generate high-quality key presents high randomness behaviour, entropy, complexity. An architecture proposed based on permutation, substitution, diffusion properties. first step, image’s pixels are...

10.1155/2020/6612390 article EN Scientific Programming 2020-12-17

Securing medical images is a great challenge to protect privacy. An image encryption model founded on complex chaos-based Pseudorandom Number Generator (PRNG) and Modified Advanced Encryption Standard (MAES) put forward in this paper. Our work consists of the following three main points. First, we propose use PRNG based two different chaotic systems which are 2D Logistic map set Henon’s system key generation procedure. Second, MAES 128 bits, subbytes’ operation performed using four S-boxes...

10.1155/2021/6610655 article EN Scientific Programming 2021-02-04

In this paper we propose a novel and efficient hardware implementation of an image watermarking system based on the Haar Discrete Wavelet Transform (DWT). DWT is used in to hide secret pieces information into digital content with good robustness. The main advantage frequencies separation four subbands (LL, LH, HL, HH) which can be treated independently. This permits ensuring better compromise between robustness visibility factors. A Field Programmable Gate Array (FPGA) that very large scale...

10.1155/2019/1294267 article EN Security and Communication Networks 2019-01-03

In this paper, we propose an efficient cryptosystem for digital image encryption and authentication. The is a hybrid scheme that uses symmetric asymmetric approaches. first one used to encrypt the host by utilizing chaos-based key generator. second initial secret owner’s signature permit algorithm evaluated validated its application on several types of standard images tools such as statistical analysis, key, performance analysis. results indicate proposed provides high enhanced security....

10.1155/2020/8937676 article EN cc-by Journal of Electrical and Computer Engineering 2020-10-31

This paper presents a hardware implementation of the lifting 2D discrete wavelet transform Haar for real-time image applications. The architecture is designed using Xilinx System Generator software. Then, it implemented on FPGA-ZYNQ ZC 020 which results in low resources utilization and high performance. In FPGA-ZYNQ, proposed DWT can achieve frequency 271.37 MHz with throughput 8683.84 Mbps. addition, an application watermarking presented. algorithm inserts binary watermark high-frequency...

10.1109/ic_aset53395.2022.9765864 article EN 2022-03-22

This paper proposes a well-optimized FPGA implementation of chaos-based cryptosystem for real-time image encryption and decryption. A highly sensitive Pseudo-Random Number Generator (PRNG) based on the Lorenz chaotic system is designed to generate pseudo-random numbers. high-quality key acquired by encrypting numbers 128-bit counter using PRNG. For encryption, first decomposed into blocks. Then, blocks are encrypted XORing pixels with stream. [Formula: see text] cycles can be achieved...

10.1142/s0218126621502042 article EN Journal of Circuits Systems and Computers 2021-02-08

This paper focuses on the contribution to realization of a real time implementation system numerical watermarking system. We start by proposition our model success hardware applied image. operation consist decompose original image into second level decomposition discrete wavelet transform. Our was implemented ML507 Evaluation Platform which is based Virtex-5 FPGA using Xilinx System Generator tool.

10.1109/sta.2015.7505194 article EN 2015-12-01

In this paper, we present a novel hardware implementation of watermarking system applied on the digital image. The proposed is based DWT (Haar discrete wavelet transform) first level decomposition. watermark hidden in LH <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">0</sub> (mean frequency sub-band) goal to get maximum compromise between visibility and robustness factors against several attacks. ML507 Evaluation Platform, which Virtex-5 FPGA,...

10.1109/sta.2016.7952031 article EN 2016-12-01

The following topics are dealt with: low-power electronics; medical image processing; data compression; field programmable gate arrays; integrated circuit design; modelling; nanoelectronics; organic effect transistors; numerical analysis; zinc compounds.

10.1109/dtss.2019.8914880 article EN 2019-04-01

Summary This paper proposed a hardware architecture of strong block‐cipher system dedicated to digital image encryption and decryption. On the one hand, pseudorandom number generator (PRNG) based on two 3D chaotic systems is created produce keys. other robust algorithm ensure high‐level security low computational complexity encryption. The performs mainly through three processes: pixel values hiding by applying XOR operation with key, positions operating random permutation, substitution...

10.1002/cta.3415 article EN International Journal of Circuit Theory and Applications 2022-08-27

Summary This article puts forward a fast chaos‐RSA‐based hybrid cryptosystem to secure and authenticate secret images. The SHA‐512 is used generate 512‐bit initial key. RSA system encrypt the key signature generation for both sender image authentication. In fact, powerful block‐cipher algorithm developed decrypt images with high level of security. At this stage, strong PRNG based on four chaotic systems propounded high‐quality keys. Therefore, an improved architecture suggested. It performs...

10.1002/cpe.7187 article EN Concurrency and Computation Practice and Experience 2022-07-16

This paper puts forward a real-time architecture of chaos-based encryption system dedicated to perform image and decryption. An evolutionary Pseudo Random Number Generator (PRNG) was designed implemented generate sensitive pseudo-random numbers based on the Lorenz chaotic system. We propose new security approach XORing pixels with generated key sequence. To increase complexity R’ cycles could be done. The proposed design implemented, validated using platform Xilinx Zynq FPGA. In addition,...

10.1109/setit54465.2022.9875573 article EN 2022-05-28

This paper suggests a high-performance FPGA implementation of strong pseudo-random numbers generator for several applications mainly in the security domain. An improved PRNG utilizing Lorenz chaotic map is propounded. Then, using Xilinx System Generator software society an architecture DPRNG developed. Next, hardware implemented on FPGA-Zynq resulting low resource utilization, good frequency 194.714 MHz, and high throughput 25702 Mbps. The NIST 800-22 SP test suite result demonstrates that...

10.1109/setit54465.2022.9875453 article EN 2022-05-28

A vast volume of digital electronic health records is exchanged across the open network in this modern era. Cross all existing security methods, encryption a dependable method data security. This study discusses an technique for medical images that uses chaos combined with deoxyribonucleic acid (DNA). In fact, Rossler's and Lorenz's chaotic systems along DNA encoding are used suggested image cryptographic system. Chaos to create random key stream. The rules then encode input original image....

10.1109/sta56120.2022.10019116 article EN 2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA) 2022-12-19

In this paper, the hardware implementation of a Chaotic/RCA-based cryptosystem devoted to information security purposes on Field Programmable Gate Array (FPGA) is given. The Xilinx System Generator software tools (XSG) are adopted design complex high-performance Chen-based PRNG generate Pseudo-random key streams and chaotic/Reversible Cellular Automata-based following stream-cipher mode. Then, overall implemented an FPGA Zedboard achieving high throughput 23987.2 Mbps working at superb...

10.1109/sta56120.2022.10019105 article EN 2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA) 2022-12-19

This contribution is a hardware design and implementation of an enhanced Pseudo-Random Number Generator (PRNG) dedicated to security applications on Field Programmable Gate Array (FPGA). high-performance Lorenz chaotic-based PRNG improved using Elementary Cellular Automata for key encoding. Then, the developed with Xilinx System software tools. The targeted at FPGA Zedboard operating high throughput 49946.62 Mbps good frequency 195.104 MHz. NIST 800–22 SP test suite results validate...

10.1109/sta56120.2022.10019236 article EN 2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA) 2022-12-19

In recent years, information and communication systems have experienced serious security issues due to the rising popularity of image-sharing platforms ubiquity numerous smart electronic devices. The increased volume data generated by medical clinical communities necessitates use such advanced for exchange. As a result, implementation improved procedures resources in terms storage is essential. This research proposes novel image encryption method based on chaos sequence modified Twofish...

10.1109/sta56120.2022.10019069 article EN 2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA) 2022-12-19
Coming Soon ...