Amir Akhavan
Universiti Sains Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Amir Akhavan.
Journal of The Franklin Institute-engineering and Applied Mathematics | 2011
Amir Akhavan; Azman Samsudin; Afshin Akhshani
Abstract During the recent years several chaotic image encryption algorithms have been proposed, but most of them encountered some drawbacks such as small key space, low speed, lack of robustness and low security. In this paper, we have proposed an image algorithm based on the combination of a one-dimensional polynomial chaotic map and a piecewise nonlinear chaotic map. Theoretical analysis and computer simulations, both confirm that the new algorithm possesses high security, robust fast encryption speed for practical image encryption and solves the problem of small key space.
EURASIP Journal on Advances in Signal Processing | 2013
Amir Akhavan; Azman Samsudin; Afshin Akhshani
As the core of cryptography, hash function is one of the basic techniques for information security. During the last few years, considerable effort has been devoted to research on chaos-based hash functions. Nevertheless, the corresponding analysis of them lag far behind. In this paper, a new efficient scheme for parallel hash function based on high-dimensional chaotic map is proposed. In the proposed scheme, the confusion as well as the diffusion effect is enhanced significantly by utilizing two nonlinear coupling parameters. Theoretical and experimental results indicate that the proposed scheme can satisfy all performance requirements of hash function such as desired statistical properties and strong collision resistance. At the same time, the proposed scheme can keep the parallel merit and message sensitivity with high potential to be adopted for network security.
Journal of Systems and Software | 2013
S. Behnia; Amir Akhavan; Afshin Akhshani; Azman Samsudin
An image encryption algorithm based chaotic Jacobian elliptic maps is presented.The proposed scheme is subjected to some security analyses as well as statistical tests suites.Security analysis and simulation results indicate that the scheme possesses high security. In this paper, a novel image encryption algorithm based on the Jacobian elliptic maps is presented. To illustrate the effectiveness of the proposed scheme, some security analyses are presented. It can be concluded that, the proposed image encryption technique can be applied for practical applications. Although the Jacobian elliptic maps presented in this paper aim at image encryption, it is not just limited to this experience and can be directly applied in other information security fields such as video encryption.
International Journal of Bifurcation and Chaos | 2008
S. Behnia; Afshin Akhshani; Hadi Mahmodi; Amir Akhavan
In recent years, a growing number of cryptosystems based on chaos have been proposed. But most of them have encountered many problems such as small key space and weak security. In the present paper, a new kind of chaotic cryptosystem based on Composition of Trigonometric Chaotic Maps is proposed. These maps which are defined as ratios of polynomials of degree N, have interesting properties such as invariant measure, ergodicity, variable chaotic region with respect to the control parameters and ability to construct composition form of maps. We have used a composition of chaotic map to shuffle the position of image pixels. Another composition of chaotic map is used in diffusion process. According to the performed analysis, the introduced algorithm can satisfy the required performances such as high level security, large key space and the acceptable encryption speed.
Journal of Computational and Applied Mathematics | 2011
S. Behnia; Amir Akhavan; Afshin Akhshani; Azman Samsudin
An interesting hierarchy of random number generators is introduced in this paper based on the review of random numbers characteristics and chaotic functions theory. The main objective of this paper is to produce an ergodic dynamical system which can be implemented in random number generators. In order to check the efficacy of pseudo random number generators based on this map, we have carried out certain statistical tests on a series of numbers obtained from the introduced hierarchy. The results of the tests were promising, as the hierarchy passed the tests satisfactorily, and offers a great capability to be employed in a pseudo random number generator.
international conference on image processing | 2006
Afshin Akhshani; Hadi Mahmodi; Amir Akhavan
In the past few years, a number of image encryption algorithms based on chaotic maps have been proposed. One dimensional chaotic system with the advantages of high-level efficiency and simplicity, has been widely used. But many of them essentially encounter with problems such as small key space and weak security. To overcome these drawbacks, we introduce a new method of image encryption based on composition of trigonometric maps (CTMs). The proposed scheme utilises chaotic properties for image encryption via the chaotic composition maps. Experimental results show that the new cipher has satisfactory security with a large key space, which makes it a potential candidate for encryption. It is practicable and reliable, with high potential to be adopted for Internet image encryption, transmission applications and other information security fields.
international symposium on computer and information sciences | 2006
Amir Akhavan; Hadi Mahmodi; Afshin Akhshani
In recent years, a growing number of cryptosystems based on chaos have been proposed, however, most of them encounter with some problems such as: low level of security and small key space. Chaotic maps have good properties such as ergodicity, sensitivity to initial conditions and control parameters, etc. Due to these features, they are good candidate for information encryption. In this paper, encryption based on the Polynomial Chaotic Maps (PCMs) is proposed. The theoretic and simulation results state that the proposed algorithm has many properties such as high speed and large key space and high security. Therefore it is suitable for practical use in the secure communications.
International Journal of Modern Physics C | 2010
Afshin Akhshani; S. Behnia; Amir Akhavan; Siew-Choo Lim; Zainuriah Hassan
In this paper, a hierarchy of coupled maps in synchronized state is introduced. Then some discussions about the individual properties of these chaotic maps are presented, from a dynamical systems viewpoint. Also, one of these chaotic map is used as a Nonlinear Pseudo Random Generator (NPRNG). This paper addresses the chaotic features of this map which are useful for generating nonlinear pseudo random numbers. Results of the analysis and extensive tests such as the NIST, DIEHARD and ENT test suites indicate that the NPRNG exhibits good statistical randomness properties.
Information Visualization | 2018
Azam Majooni; Mona Masood; Amir Akhavan
The basic premise of this research is investigating the effect of layout on the comprehension and cognitive load of the viewers in the information graphics. The term ‘Layout’ refers to the arrangement and organization of the visual and textual elements in a graphical design. The experiment conducted in this study is designed based on two stories and each one of these stories is presented with two different layouts. During the experiment, eye-tracking devices are applied to collect the gaze data including the eye movement data and pupil diameter fluctuation. In the research on the modification of the layouts, contents of each story are narrated using identical visual and textual elements. The analysis of eye-tracking data provides quantitative evidence concerning the change of layout in each story and its effect on the comprehension of participants and variation of their cognitive load. In conclusion, it can be claimed that the comprehension from the zigzag form of the layout was higher with a less imposed cognitive load.
Archive | 2016
Azam Majooni; Mona Masood; Amir Akhavan
The focus of this study is investigating efficiency of coding and grouping methods in reducing split attention effect in scientific graphs and diagrams by applying local changes in the structure of scientific materials. The diagrams and graphs are regularly used in the structure of materials along with textual explanation to provide supplementary information and insight to the readers and is referred as redundancy principle. In some cases, the redundant presentation of visual and textual content could lead to split attention effect and cognitive overload. Although, multimedia learning theory claims that in order to enhance learning, information should be presented in multi-mode format the design and implementation of the multi-modal presentation is of great importance. Having incredible flexibility, if multimedia elements are not applied properly, they cause confusion and adversely affect comprehension of the readers.