scispace - formally typeset
Search or ask a question
Author

Jila Ayubi

Bio: Jila Ayubi is an academic researcher. The author has contributed to research in topics: Key space & Encryption. The author has an hindex of 2, co-authored 4 publications receiving 11 citations.

Papers
More filters
Book ChapterDOI
20 Sep 2012
TL;DR: In this paper, a new watermarking scheme for Gray scale image is proposed based on a family of chaotic maps and Singular Value Decomposition, Jacobian elliptic map is used to encrypt the watermark logo to improve the security of watermarked image.
Abstract: In this letter a new watermarking scheme for Gray scale image is proposed based on a family of the chaotic maps and Singular Value Decomposition. Jacobian elliptic map is used to encrypt the watermark logo to improve the security of watermarked image. Quantum map is also used to determine the location of image’s block for the watermark embedding. To test the robustness and effectiveness of our proposed method, several attacks are applied to the watermarked image and the best results have been reported. The purpose of this algorithm is to improve the shortcoming of watermarking such as small key space and low security. The experimental results demonstrate that the key space is large enough to resist the attack and the distribution of grey values of the encrypted image has a random-like behavior, which makes it a potential candidate for encryption of multimedia data such as images, audios and even videos.

6 citations

Proceedings ArticleDOI
28 Apr 2015
TL;DR: In this paper, a brain emotional prediction (BEP) method is used for short-term load forecasting, which reduces the operating costs and increases reliability of power system operations, in a practical power system, using its electricity demand data.
Abstract: Using a precise short-term load forecasting (STLF) reduces the operating costs and increases reliability of power system operations. In this paper, a brain emotional prediction (BEP) method is used for STLF. The ability of the method is verified in a practical power system, using its electricity demand data. An algorithm is developed to choose the BEP input data base on the type of the forecasted day, in order to increase the performance of the proposed method. The simulation results confirm the ability of the proposed method for short-term load forecasting.

4 citations

Journal ArticleDOI
15 Dec 2014
TL;DR: The experimental results demonstrate that the key space is large enough to resist the attack and the distribution of grey values of the encrypted image has a random-like behavior, which makes it a potential candidate for encryption of multimedia data such as images, audios and even videos.
Abstract: In this letter a new watermarking scheme for Gray scale image is proposed based on a family of the chaotic maps and Singular Value Decomposition. Jacobian elliptic map is used to encrypt the watermark logo to improve the security of watermarked image. Quantum map is also used to determine the location of image's block for the watermark embedding. To test the robustness and effectiveness of our proposed method, several attacks are applied to the watermarked image and the best results have been reported. The purpose of this algorithm is to improve the shortcoming of watermarking such as small key space and low security. The experimental results demonstrate that the key space is large enough to resist the attack and the distribution of grey values of the encrypted image has a random-like behavior, which makes it a potential candidate for encryption of multimedia data such as images, audios and even videos.

2 citations

28 Nov 2014
TL;DR: The experimental results demonstrate that the key space is large enough to resist the attack and the distribution of grey values of the encrypted image has a random-like behavior, which makes it a potential candidate for encryption of multimedia data such as images, audios and even videos.
Abstract: In this letter a new watermarking scheme for Gray scale image is proposed based on a family of the chaotic maps and Singular Value Decomposition. Jacobian elliptic map is used to encrypt the watermark logo to improve the security of watermarked image. Quantum map is also used to determine the location of image’s block for the watermark embedding. To test the robustness and effectiveness of our proposed method, several attacks are applied to the watermarked image and the best results have been reported. The purpose of this algorithm is to improve the shortcoming of watermarking such as small key space and low security. The experimental results demonstrate that the key space is large enough to resist the attack and the distribution of grey values of the encrypted image has a random-like behavior, which makes it a potential candidate for encryption of multimedia data such as images, audios and even videos.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper, the quadratic family has been used to define hyperbolicity in linear algebra and advanced calculus, including the Julia set and the Mandelbrot set.
Abstract: Part One: One-Dimensional Dynamics Examples of Dynamical Systems Preliminaries from Calculus Elementary Definitions Hyperbolicity An example: the quadratic family An Example: the Quadratic Family Symbolic Dynamics Topological Conjugacy Chaos Structural Stability Sarlovskiis Theorem The Schwarzian Derivative Bifurcation Theory Another View of Period Three Maps of the Circle Morse-Smale Diffeomorphisms Homoclinic Points and Bifurcations The Period-Doubling Route to Chaos The Kneeding Theory Geneaology of Periodic Units Part Two: Higher Dimensional Dynamics Preliminaries from Linear Algebra and Advanced Calculus The Dynamics of Linear Maps: Two and Three Dimensions The Horseshoe Map Hyperbolic Toral Automorphisms Hyperbolicm Toral Automorphisms Attractors The Stable and Unstable Manifold Theorem Global Results and Hyperbolic Sets The Hopf Bifurcation The Hnon Map Part Three: Complex Analytic Dynamics Preliminaries from Complex Analysis Quadratic Maps Revisited Normal Families and Exceptional Points Periodic Points The Julia Set The Geometry of Julia Sets Neutral Periodic Points The Mandelbrot Set An Example: the Exponential Function

104 citations

Journal Article
TL;DR: The emerging discipline known as chaos theory is a relatively new field of study with a diverse range of applications (i.e., economics, biology, meteorology, etc.). Despite this, there is not as yet a universally accepted definition for ''chaos'' as it applies to general dynamical systems.
Abstract: Abstract : The emerging discipline known as \"chaos theory\" is a relatively new field of study with a diverse range of applications (i.e., economics, biology, meteorology, etc.). Despite this, there is not as yet a universally accepted definition for \"chaos\" as it applies to general dynamical systems. Various approaches range from topological methods of a qualitative description; to physical notions of randomness, information, and entropy in ergodic theory; to the development of computational definitions and algorithms designed to obtain quantitative information. This thesis develops some of the current definitions and discusses several quantitative measures of chaos. It is intended to stimulate the interest of undergraduate and graduate students and is accessible to those with a knowledge of advanced calculus and ordinary differential equations. In covering chaos for continuous systems, it serves as a complement to the work done by Philip Beaver, which details chaotic dynamics for discrete systems.

85 citations

Journal ArticleDOI
01 Jun 2020
TL;DR: The use of the bifurcation diagram and Lyapunov exponent analysis showed that the proposed chaos game has the dynamical behavior, and fully chaotic characteristic, and can be used as a secure PRNG in cryptography systems.
Abstract: In this paper, a digital image encryption algorithm is proposed based on the generalized model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo-random number generator (PRNG) in the proposed encryption algorithm. The foundation of the chaos game is based on basic points and its distance ratio that determine the basis of how they distribute random values in 2D or 3D space. These basic points are entered by the user interface and are the result of an encrypted image with a fractal structure. The use of the bifurcation diagram and Lyapunov exponent analysis showed that the proposed chaos game has the dynamical behavior, and fully chaotic characteristic, and can be used as a secure PRNG in cryptography systems. In the proposed method, the region of interest is determined by a number of Bases, and the fractal mechanism of chaos game for the encryption process is performed on the image. This process is very sensitive to any changes in keys and refers to confusion. The evaluation results of security and performance analysis on standard images confirm the efficiency of the proposed method and demonstrate that the proposed method is robust against attacks.

62 citations

Journal ArticleDOI
TL;DR: It can be concluded that, the proposed novel watermarking scheme for image authentication can be applied for practical applications.
Abstract: Hierarchy of one-dimensional ergodic chaotic maps with Tsallis type of q -deformation are studied. We find that in the chaotic region, these maps with q -deformation are ergodic as the Birkhoff ergodic theorem predicts. q -deformed maps are defined as ratios of polynomials of degree N . Hence, by using the Stieltjes transform approach (STA), invariant measure is proposed. In addition, considering Sinai-Ruelle-Bowen (SRB) measure, Kolmogorov-Sinai (KS) entropy for q -deformed maps is calculated analytically. The new q -deformed scheme have ability to keep previous significant properties such as ergodicity, sensitivity to initial condition. By adding q -parameter to the hierarchy in order increase the randomness and one-way computation, we present a new scheme for watermarking. The introduced algorithm tries to improve the problem of failure of encryption such as small key space, encryption speed and level of security. To illustrate the effectiveness of the proposed scheme, some security analyses are presented. By considering the obtained results, it can be concluded that, this scheme have a high potential to be adopted for watermarking. It can be concluded that, the proposed novel watermarking scheme for image authentication can be applied for practical applications.

25 citations