Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Iqtadar Hussain is active.

Publication


Featured researches published by Iqtadar Hussain.


International Journal of Computational Intelligence Systems | 2017

Analyses of S-boxes based on interval valued intuitionistic fuzzy sets and image encryption

Saleem Abdullah; Sanam Ayub; Iqtadar Hussain; Benjamin Bedregal; Muhammad Yaqub Khan

Decision making implies selection of the best decision from a set of possible options. In some cases, this selection is based on past experience. Past experience is used to analyse the situations and the choice made in these situations. The aim of this work is to analyse the strength of the nonlinear component (S-box) of block cipher for image encryption applications based on Interval Valued Intuitionistic Fuzzy Sets (IVIFS). S-box is the only component in every block cipher which creates confusion in the data. First, we transform the three dimensional matrix corresponding to colour image with the help of nonlinear component and then use the algebraic structure of IVIFS to choose the best substitution box for image encryption based on entropy, contrast, homogeneity, correlation, energy and mean of absolute devotion. The analyses show that the readings of S8 S-box is very good for image data.


AIP Advances | 2017

An algorithm for the construction of substitution box for block ciphers based on projective general linear group

Anas Altaleb; Muhammad Saeed; Iqtadar Hussain; Muhammad Aslam

The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confusion creating potential of an S-box depends on its construction technique. In the first step, we have applied the algebraic action of the projective general linear group PGL(2,GF(28)) on Galois field GF(28). In step 2 we have used the permutations of the symmetric group S256 to construct new kind of S-boxes. To explain the proposed extension scheme, we have given an example and constructed one new S-box. The strength of the extended S-box is computed, and an insight is given to calculate the confusion-creating potency. To analyze the security of the S-box some popular algebraic and statistical attacks are performed as well. The proposed S-box has been analyzed by bit independent criterion, linear approximation probability test, non-linearity test, strict avalanche criterion, differential approximation probability test, and majority logic criterion. A comparison of the proposed S-box with existing S-boxes sho...


Security and Communication Networks | 2018

A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map

Amir Anees; Iqtadar Hussain; Abdulmohsen Algarni; Muhammad Aslam

The protection of copyrights of digital media uploaded to the Internet is a growing problem. In this paper, first, we present a unified framework for embedding and detecting watermark in digital data. Second, a new robust watermarking scheme is proposed considering this concern. The proposed work incorporates three chaotic maps which specify the location for embedding the watermark. Third, a new chaotic map, the Extended Logistic map, is proposed in this work. The proposed map has a bigger range than logistic and cubic maps. It has shown good results in a bifurcation, sensitivity to initial conditions, and randomness tests. Furthermore, with the detailed analysis of initial parameters, it is justified that Extended Logistic map can be used in secure communication, particularly watermarking. Fourth, to check the robustness of proposed watermarking scheme, we have done a series of analyses and standard attacks. The results confirm that the proposed watermarking scheme is robust against visual and statistical analysis and can resist the standard attacks.


Journal of Intelligent and Fuzzy Systems | 2018

Extension of TOPSIS method base on Choquet integral under interval-valued Pythagorean fuzzy environment

Muhammad Sajjad Ali Khan; Saleem Abdullah; Muhammad Ali; Iqtadar Hussain; Muhammad Farooq


International Journal of Thermal Sciences | 2018

Heat and mass transport phenomena of radiated slender body of three revolutions with saturated porous: Buongiorno's model

C.S.K. Raju; S. Saleem; S.U. Mamatha; Iqtadar Hussain


European Physical Journal Plus | 2018

A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps

Iqtadar Hussain; Amir Anees; Muhammad Aslam; Rehan Ahmed; Nasir Siddiqui


Chinese Journal of Physics | 2018

Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications

Iqtadar Hussain; Amir Anees; Ali H. Alkhaldi; Abdulmohsen Algarni; Muhammad Aslam


3d Research | 2015

Construction of Dynamical Non-linear Components Based on Lorenz System and Symmetric Group of Permutations

Iqtadar Hussain; Muhammad Asif Gondal; Azkar Hussain


3d Research | 2015

Construction of Substitution Box Based on Piecewise Linear Chaotic Map and S8 Group

Iqtadar Hussain; Muhammad Asif Gondal; Azkar Hussain


3d Research | 2015

An Efficient Method for Secure Communication of Biometric Information Based on Chaos

Iqtadar Hussain; Ali S. Al-Qahtani; Muhmmad Asif Gondal

Collaboration


Dive into the Iqtadar Hussain's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Muhammad Asif Gondal

National University of Computer and Emerging Sciences

View shared research outputs
Top Co-Authors

Avatar

Saleem Abdullah

Abdul Wali Khan University Mardan

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

S. Saleem

King Khalid University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge